skip to content
Internet protocol-based emergency services Preview this item
ClosePreview this item

Internet protocol-based emergency services

Author: Henning Schulzrinne
Publisher: Chichester, West Sussex : John Wiley & Sons Inc., 2013.
Edition/Format:   Print book : EnglishView all editions and formats

* Provides an overview of how thestandards related to IP-based emergency services work, and howvarious organizations contributed to them *


(not yet rated) 0 with reviews - Be the first.

More like this


Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Additional Physical Format: Online version:
Schulzrinne, Henning.
Internet protocol-based emergency services
Chichester, West Sussex : John Wiley & Sons Inc., 2014
(DLC) 2013008110
Document Type: Book
All Authors / Contributors: Henning Schulzrinne
ISBN: 9780470689769 0470689765 1118652479 9781118652473
OCLC Number: 828053607
Description: xxxiii, 367 pages : illustrations ; 25 cm.
Contents: <p>List of Figures xiii <p>List of Tables xvii <p>List of Contributors xix <p>Preface xxi <p>Acknowledgments xxv <p>Acronyms xxvii <p>1 Introduction 1 <p>1.1 History 1 <p>1.2 Overview 5 <p>1.3 Building Blocks 8 <p>1.3.1 Recognizing Emergency Calls 8 <p>1.3.2 Obtaining and Conveying Location Information 9 <p>1.3.3 Routing Emergency Calls 9 <p>2 Location: Formats, Encoding and Protocols 11 <p>2.1 Applying the PIDF-LO civicAddress Type to US Addresses14 <p>2.1.1 Introduction: The Context and Purpose of PIDF-LO and CLDXF15 <p>2.1.2 CLDXF Elements 17 <p>2.1.3 Conclusion 30 <p>2.2 DHCP as a Location Configuration Protocol (LCP) 31 <p>2.2.1 What s New in RFC 6225? 32 <p>2.2.2 DHCPv4 and DHCPv6 Option Formats 32 <p>2.2.3 Option Support 35 <p>2.2.4 Latitude and Longitude Fields 36 <p>2.2.5 Altitude 36 <p>2.2.6 Datum 37 <p>2.3 Geography Markup Language (GML) 37 <p>2.3.1 Introduction 37 <p>2.3.2 Overview of the OGC 38 <p>2.3.3 The OGC Geography Markup Language (GML) 38 <p>2.3.4 Conclusion 47 <p>2.4 A Taxonomy of the IETF HELD Protocol 47 <p>2.4.1 The LIS and HELD 48 <p>2.4.2 LIS Discovery 48 <p>2.4.3 Basic HELD 53 <p>2.4.4 HELD Target Identities and Third-Party Requests 59 <p>2.4.5 HELD Measurements 62 <p>2.4.6 HELD as a Dereference Protocol 64 <p>2.4.7 HELD Policy URIs 66 <p>2.4.8 HELD Device Capabilities 69 <p>2.5 OMA Enablers and Emergency Services 72 <p>2.5.1 SUPL 73 <p>2.5.2 MLS 84 <p>2.5.3 MLP 85 <p>2.5.4 LOCSIP 89 <p>2.6 3GPP Location Protocols 92 <p>2.6.1 Introduction 92 <p>2.6.2 Location Technology in 3GPP Networks 93 <p>2.6.3 Emergency Location Information in 3GPP CS Domain, ControlPlane 100 <p>2.6.4 Emergency Location Information in the IMS 100 <p>3 Architectures 103 <p>3.1 NENA i2 104 <p>3.1.1 Background 104 <p>3.1.2 The i2 Architecture 105 <p>3.1.3 Regulatory Situation and Deployment Status 117 <p>3.2 NENA i3 119 <p>3.2.1 History 119 <p>3.2.2 Emergency Services IP Networks 120 <p>3.2.3 Signaling and Routing IP-Originated Calls 121 <p>3.2.4 Legacy Wireline and Wireless Origination 122 <p>3.2.5 Emergency Events 123 <p>3.2.6 Routing Calls Within the ESInet 123 <p>3.2.7 Provisioning the ECRF 124 <p>3.2.8 PSAPs 125 <p>3.2.9 Other i3 Features 126 <p>3.3 IETF Emergency Services for Internet Multimedia 126 <p>3.3.1 Introduction 126 <p>3.3.2 Recognizing Emergency Calls 128 <p>3.3.3 Obtaining and Conveying Location Information 128 <p>3.3.4 Routing Emergency Calls 129 <p>3.3.5 Obligations 130 <p>3.3.6 LoST Mapping Architecture 132 <p>3.3.7 Steps Toward an IETF Emergency Services Architecture135 <p>3.3.8 Summary 138 <p>3.4 Emergency Services Support in WiFi Networks 139 <p>3.4.1 Introduction 139 <p>3.4.2 Location Configuration 140 <p>3.4.3 Support for Emergency Services 141 <p>3.4.4 Support for Emergency Alert Systems 142 <p>3.5 WiMAX 142 <p>3.5.1 The WiMAX Network Architecture 143 <p>3.5.2 Network Architecture for Emergency Services Support148 <p>3.5.3 The Fundamental Building Blocks 150 <p>3.5.4 Roaming Considerations and Network Entry 152 <p>3.5.5 Limited Access 154 <p>3.5.6 Location Support in WiMAX 157 <p>3.5.7 Conclusion 163 <p>3.6 3GPP 163 <p>3.6.1 Introduction 163 <p>3.6.2 Requirements 164 <p>3.6.3 Emergency Calls in the CS Domain 169 <p>3.6.4 Emergency Calls in PS Domain 176 <p>3.6.5 Identified Overload Problems 189 <p>4 Deployment Examples 193 <p>4.1 Emergency Calling in Sweden 195 <p>4.1.1 Introduction 195 <p>4.1.2 Overview 196 <p>4.1.3 Protocols for PSAP Interconnection 198 <p>4.1.4 Protocol Standards 200 <p>4.1.5 Media 201 <p>4.1.6 Emergency Call Routing 201 <p>4.1.7 Testing 201 <p>4.1.8 Examples 201 <p>4.2 UK Specification for Locating VoIP Callers 209 <p>4.2.1 Introduction 209 <p>4.2.2 The Regulatory Environment 209 <p>4.2.3 Standards Development 210 <p>4.2.4 The Current UK Emergency Services Structure 210 <p>4.2.5 Principles Driving the Specification 211 <p>4.2.6 Putting It All Together 213 <p>4.2.7 Implications for Access Network Providers 215 <p>4.3 Implementation of VoIP 9-1-1 Services in Canada 216 <p>4.3.1 Regulatory Framework (About the CRTC) 217 <p>4.3.2 Canada s Telecom Profile 217 <p>4.3.3 Interim Solution for Nomadic and Fixed/Non-Native VoIP220 <p>4.3.4 The (Defunct) Canadian i2 Proposal 222 <p>4.3.5 VoIP Regulatory Processes, Decisions and Milestones227 <p>4.3.6 Lessons Learned 229 <p>4.3.7 Conclusion 230 <p>4.4 US/Indiana Wireless Direct Network Project 230 <p>4.4.1 Background and History of the IWDN 231 <p>4.4.2 The IWDN Crossroads Project 231 <p>4.4.3 The IN911 IP Network 232 <p>4.4.4 Conclusion 235 <p>5 Security for IP-Based Emergency Services 237 <p>5.1 Introduction 237 <p>5.2 Communication Model 238 <p>5.3 Adversary Models and Security Threats 240 <p>5.4 Security Threats 241 <p>5.4.1 Denial-of-Service Attacks 242 <p>5.4.2 Attacks Involving the Emergency Identifier 242 <p>5.4.3 Attacks Against the Mapping System 243 <p>5.4.4 Attacks Against the Location Information Server 244 <p>5.4.5 Swatting 245 <p>5.4.6 Attacks to Prevent a Specific Individual From ReceivingAid 246 <p>5.4.7 Attacks to Gain Information About an Emergency 246 <p>5.4.8 Interfering With the LIS and LoST Server DiscoveryProcedure 246 <p>5.4.9 Call Identity Spoofing 247 <p>5.5 Countermeasures 248 <p>5.5.1 Discovery 248 <p>5.5.2 Secure Session Setup and Caller Identity 250 <p>5.5.3 Media Exchange 251 <p>5.5.4 Mapping Database Security 251 <p>6 Emergency Services for Persons With Disabilities253 <p>6.1 What Is Specific with Communication for People withDisabilities? 253 <p>6.1.1 Important Characteristics of Regular Voice Telephony253 <p>6.1.2 Important Characteristics of Accessible ConversationalServices Suitable for People with Disabilities 254 <p>6.2 Reality Today 255 <p>6.3 Interpretation of the Term Equivalent Service 255 <p>6.4 Sad History 256 <p>6.5 Policy and Regulation Support 256 <p>6.5.1 UN Convention on the Rights of Persons with Disabilities256 <p>6.5.2 The European Union Universal Service Directive 257 <p>6.5.3 The Telecom Act and Public Procurement Act in the UnitedStates 257 <p>6.5.4 Americans With Disability Act 257 <p>6.5.5 Relay Service Regulation in the United States 258 <p>6.6 Good Opportunities in IP-Based Services 258 <p>6.7 Implementation Experience 260 <p>7 Regulatory Situation 261 <p>7.1 Regulatory Aspects of Emergency Services in the UnitedStates 262 <p>7.1.1 Introduction 262 <p>7.1.2 Background 262 <p>7.1.3 E9-1-1 Requirements 263 <p>7.2 Regulatory Aspects of Emergency Services in the EuropeanUnion 266 <p>7.2.1 Introduction 266 <p>7.2.2 Regulatory Development of Emergency Services Under EU Law267 <p>7.2.3 Current Legal Framework 267 <p>7.2.4 New Legal Framework 274 <p>7.2.5 Emergency Regulation Outside of the EU Telecom RegulatoryFramework 276 <p>7.2.6 Conclusion 276 <p>8 Research Projects and Pilots 279 <p>8.1 REACH112: Responding to All Citizens Needing Help 280 <p>8.1.1 Outline 280 <p>8.1.2 Emergency Service Access 282 <p>8.1.3 The Obstacles 284 <p>8.1.4 Conclusion 288 <p>8.2 PEACE: IP-Based Emergency Applications and Services forNext-Generation Networks 288 <p>8.2.1 Introduction 288 <p>8.2.2 Project Scope 289 <p>8.2.3 Development Status 291 <p>8.3 US Department of Transportation s NG 9-1-1 PilotProject 298 <p>8.3.1 Overview 298 <p>8.3.2 Proof-of-Concept Description 300 <p>8.3.3 Testing 313 <p>8.3.4 Conclusion 317 <p>9 Organizations 321 <p>9.1 ETSI EMTEL 322 <p>9.1.1 Purpose of ETSI Special Committee EMTEL (EmergencyCommunications) 322 <p>9.1.2 Main Features of EMTEL 322 <p>9.1.3 Scope of ETSI SC EMTEL Work 323 <p>9.1.4 Operation and Activities of SC EMTEL 324 <p>9.1.5 EMTEL Evolution and Strategy 324 <p>9.1.6 Vision for Future Emergency Services 325 <p>9.2 NENA 326 <p>9.3 EENA 327 <p>9.3.1 What Is EENA? 327 <p>9.3.2 What EENA Does? 327 <p>9.3.3 What Are the EENA Memberships? 328 <p>9.4 Ecma International 330 <p>9.4.1 Ecma International 330 <p>9.4.2 Ecma Technical Committee TC32 331 <p>9.4.3 ECMA TR/101, Next Generation Corporate Networks (NGCN) Emergency Calls 331 <p>9.5 ATIS 332 <p>9.5.1 Emergency Services Interconnection Forum (ESIF) 332 <p>9.5.2 Next-Generation Emergency Services (NGES) Subcommittee333 <p>9.5.3 Example ESIF Issues 334 <p>9.5.4 Summary 336 <p>9.6 The NG9-1-1 Caucus and the NG9-1-1 Institute 336 <p>9.7 COCOM EGEA 338 <p>10 Conclusion and Outlook 341 <p>10.1 Location 341 <p>10.2 Architectures 342 <p>10.3 Deployments 343 <p>10.4 Security and Privacy 344 <p>10.5 Emergency Services for Persons with Disabilities 344 <p>10.6 Regulation 345 <p>10.7 Research Projects and Pilots 345 <p>10.8 Funding 346 <p>References 349 <p>Index 363
Responsibility: Henning Schulzrinne.


Editorial reviews

Publisher Synopsis


User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...


Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data

schema:name"Internet protocol-based emergency services"@en

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.