T5.4: Routing, Location-based Information and Caller ID

Size: px
Start display at page:

Download "T5.4: Routing, Location-based Information and Caller ID"

Transcription

1 T5.4: Routing, Location-based Information and Caller ID Table of content Introduction... 2 Terminology... 2 IP-based emergency services access... 3 Emergency Call Identification... 4 Call Routing... 5 Location Information... 5 Caller Identity... 8 Implementation Status Recommendations and Guidelines to the Project Conclusion Appendix T5.4: Routing, Location-based information and caller ID 1

2 Introduction The task for the work in the task 5.4 is to develop a report that will serve as input to the implementation and deployment work in the different countries. The aim is to help every pilot country to implement appropriate routing so that emergency calls get to the right PSAP, to provide PSAP s with automatic caller-location and caller-id so that first responders can intervene at the place of incident with the relevant information and use some traditional emergency services functions such as call-back. To achieve these goals, a questionnaire (see appendix A) was created by EENA (Task Leader) and sent to all involved partners. The responses were then discussed during dedicated conference calls along with the presentation of best practices in the field of routing, caller-location and caller-id. Personal contacts were then established by phone and s between EENA (Hannes Tschofenig/Gary Machado) and partners involved. Best practices, literature and ongoing standardisation efforts were reviewed by Hannes Tschofenig from EENA who is/was also involved with several standardisation groups in the field (EENA NG112, IETF ECRIT, NENA NG911, etc...). It should be noted that at the time of the redaction of the task s timeframe and missions, it was not foreseen that the tasks would deserve so much attention and efforts. Deliverable D2.1 also revealed that emergency services considered as a high priority the delivery of caller-location information. The consortium therefore decided to extend the timeframe for this task in order to provide a complete report so that to facilitate implementation in the pilot countries. The document is structured as follows: A brief description of the concept of IP-based emergency services access, since REACH112 is a unique project focusing on providing IP-access to 112 A chapter on emergency call identification and routing that has been added since routing is a challenge to be faced by the project when considering the use of IP A chapter on the provision of caller-location information A chapter on caller-identity (caller-id) An overview of the implementation status in the pilot countries Recommendations and guidelines to the project for implementation A conclusion highlighting what can be achieved and the challenges that the consortium and any other entity willing to provide IP-access to 112 will face Terminology The terms used in this document can be found in and in the NENA Glossary T5.4: Routing, Location-based information and caller ID 2

3 IP-based emergency services access The IP-based emergency services access architectures differentiate a few components that have different responsibilities for offering the complete end-to-end functionality. These roles are: Internet Service Provider (ISP) Voice Service Provider (VSP), or in a more generic form Application Service Provider (ASP) Emergency Service Provider (that operates a PSAP) and vendors of equipment for those. End Device Independent Location Server. This entity is an artefact of today s IP-to-location infrastructure and other efforts to register network specific information (e.g., base station identifiers) to location information. Note that a partner may combine multiple roles in a single organisation. Figure 1 shows the parties graphically and the arrows indicate communication interaction as utilised in the pilot projects but other interactions are possible. Figure 1: Participating Involved Entities. The emergency call interaction on a high level takes place as follows: the user enters an emergency services number (or potentially an emergency dial string). The end device recognises the entered sequence of digits as an emergency call attempt and determines whether location information is available locally (as part of the GPS module, for example). If no location information is available locally then various protocol extensions have been defined that allow the end host to obtain location information from a location server in the ISP s network. Additionally, independent location servers may be used as well. Then, the call setup procedure using SIP is started towards the user s VSP/ASP. The VSP/ASP needs to make a route decision to determine where the call T5.4: Routing, Location-based information and caller ID 3

4 needs to be forwarded to. Often, this decision is based on a combination of the caller s location information as well as other policy aspects (such as time-of-day, workload of a specific PSAP). When considering IP-access to emergency services, one should consider the following categories and the challenges they induce: Fixed Access: From a user point of view this scenario is characterised by a stationary usage of a computer, such as a desktop PC at someone s home. Typically, these devices are often not equipped with a GPS receiver or, because of the indoor usage, these do not work very well or not at all. Information about the caller s location can therefore come from manual configuration (which may be useful in cases where the location of the device indeed rarely changes or the user is careful in keeping the reported location accurate) or from the ISPs network since the attachment point is known to the operator s network infrastructure. Nomadic Access: Nomadic access is characterised in movement patterns that correspond to regular laptop usage where user s switch location from time to time (e.g. go to work, use their laptop at the university or in a coffee shop, and at home). In this scenario it is not realistic to assume that user s keep their location accurate manually due to the frequent change. The usage of GPS may be possible even though network operator presented location would be preferred since users will typically use their device indoors. Mobile Access: This scenario is an enhancement of the previously presented nomadic access with the assumption that user s roam while having their communication ongoing. In this scenario, devices, such as smart phones, are often equipped with GPS receivers and make the location determination process more accurate. Manually entered location is in this scenario not possible. Note: This is a simplified view on networking from the user s point of view. As network architectures become more sophisticated the boundaries between these scenarios get more fuzzy. As an example, one may consider a traveller using a laptop with wireless LAN (as he uses at home) in a train connected. The network infrastructure in the train is connected via a cellular infrastructure to the Internet. This example blurs nomadic access and mobile access. Consider another example where a teenager uses his high-performance laptop for gaming and sometimes uses it at home as a replacement for the desktop PC and sometimes at some LAN parties to compete with other games. From software program point of view these cases are very hard to differentiate since in all cases the end device is uses WLAN technology to communicate with the network. Hence, it is left to the user to switch between usage environments, which introduce problems when software developers make too restrictive assumptions about the environment where their devices will later be used or about the user s awareness of the necessary configuration changes. Ideally, user s should not need to configure their devices to prepare for the case of an emergency call. For the unlikely case of an emergency user s should not be required to ever configure their device zero configuration is the goal. Emergency Call Identification The overall process of establishing an emergency call begins with the person in need for help dialling the emergency dial string. The exact sequence of digits depends on the infrastructure the device is connected to. While became the emergency services number for Europe many countries still provide emergency numbers in addition to the 112. Furthermore, many large enterprises, university, and hotels prefix the emergency numbers with additional digits, such as For devices that can be used in a variety of different environments, as discussed in the previous section, it is therefore important to automatically detect which dial string leads to an emergency T5.4: Routing, Location-based information and caller ID 4

5 call. Pre-programming the list of numbers in use world-wide is not possible due to the overlap of emergency and non-emergency numbers. There are two challenges to solve: First, a device needs to have the capability to learn their emergency services numbers available for a specific attachment point. Second, for protocol treatment it is useful to replace the actual dial string with a symbolic name. The latter part is addressed by the usage of Service URNs, see RFC An example of a service URN is "urn:service:sos.police". Users do, however, not "dial" an emergency URN. Instead, the entered emergency dial strings are translated to corresponding service URNs, carried in the Request-URI of the INVITE request. This translation should ideally be done at the end point because the need to detect an emergency call at the end host is required, for example, to convey location in the signalling. Network entities can then use the service URN to easily perform preferential emergency service treatment to the incoming call setup attempt. LoST is an HTTP-based query/response protocol, see RFC 5222, which provides the mechanism for obtaining the emergency dial string for a given location. For the pilot project the usage of devices in different environments will initially be limited and hence the dynamic discovery of emergency dial strings can be replaced by provisioning of emergency numbers. Call Routing An important part of emergency handling is in the logic of delivering emergency calls to the appropriate PSAP. With devices that may be used with different VSPs/ASPs and in cases where there is no relationship between the ISP and the VSP/ASP the automatic routing decision becomes more complex. Consider the following example where REACH-112 user Bob travels to from Sweden to to Spain and wants to use their device to trigger an emergency real-time text interaction. Since Bob is using a real-time text provider in Sweden the messages are routed to the Swedish operator. Based on the provided location the Swedish operator notices that a PSAP in Spain has to be involved and, for example, initiates a conference bridge with Bob, a relay provider in Sweden serving as a language translator, and the PSAP operator in Spain. In order for the Swedish ASP/VSP or the Swedish PSAP to involve the appropriate Spanish PSAP their contact information needs to be available, and information about their responsibility (i.e. for which region they are responsible and which emergency service function they provide) needs to be published. The Location-to-Service Translation Protocol (LoST) allows this information to be made available automatically rather than exchanging Excel sheets or Word documents. The main functionality of LoST therefore is to map a location and service URN to a specific PSAP URI and a service region. The returned PSAP URI does not necessary need to be the URI of the final PSAP but rather it will route the call closer to one. A LoST client software can run on an end host, on a VSP proxy, or within the emergency services network for multi-stage routing. As an example for the emergency call routing within an emergency services network the French pilot offers such support. Location Information The topic of location information can be sub-divided into the following categories: 1) Formats of location information There are two important types of location information relevant to this document, namely civic and geodetic location information. Civic location information describes the location of a person or object by a street address that corresponds to a building or other structure. Geodetic location information contains longitude, latitude and altitude information based on a selected datum (such as WGS84). T5.4: Routing, Location-based information and caller ID 5

6 Both location formats are useful for emergency services. Geodetic information is used in the cellular world whereas civic location information is utilised in fixed network deployments. Conversation from geodetic location information to civic addresses is also possible and used particularly for dispatch of first responders. In the REACH112 project both location formats will be utilised. 2) Encoding of location information used for transmission in protocols For usage in communication protocols location information needs to be encoded and different formats have evolved over time. Two formats widely used are based on XML and on a binary encoding. For the purpose of the REACH112 project only the XML-based format is used. The XML-based format for location was introduced in RFC with the Presence Information Data Format Location Object (PIDF-LO). The format was revised with RFC (for geodetic location information) and RFC (for civic location information). Furthermore, extends the format in support of moving objects. For the project it is useful to think about a civic location profile for the respective member countries in the style of RFC An example PIDF-LO document that shows location information that could have been provided by a GPS receiver with a point location shape (lat/long values only) inside a SIP INVITE is shown below: INVITE sips:[email protected] SIP/2.0 Via: SIPS/2.0/TLS pc33.atlanta.example.com;branch=z9hg4bk74bf9 Max-Forwards: 70 To: PSAP <sips:[email protected]> From: Alice <sips:[email protected]>;tag=9fxced76sl Call-ID: @atlanta.example.com Geolocation: <cid:[email protected]> ;routing-allowed=yes Supported: geolocation Accept: application/sdp, application/pidf+xml CSeq: INVITE Contact: <sips:[email protected]> Content-Type: multipart/mixed; boundary=boundary1 Content-Length:... --boundary1 Content-Type: application/sdp...sdp goes here T5.4: Routing, Location-based information and caller ID 6

7 --boundary1 Content-Type: application/pidf+xml Content-ID: <?xml version="1.0" encoding="utf-8"?> <presence xmlns="urn:ietf:params:xml:ns:pidf" xmlns:gp="urn:ietf:params:xml:ns:pidf:geopriv10" xmlns:cl="urn:ietf:params:xml:ns:pidf:geopriv10:civicaddr" xmlns:gml=" <tuple id="target123"> <dm:device id="target123-1"> <gp:geopriv> <gp:location-info> <gml:location> <gml:point srsname="urn:ogc:def:crs:epsg::4326"> <gml:pos> </gml:pos> </gml:point> </gml:location> </gp:location-info> <gp:usage-rules> <gp:retransmission-allowed>no </gp:retransmission-allowed> <gp:retention-expiry> t20:00:00z </gp:retention-expiry> </gp:usage-rules> <gp:method>gps</gp:method> </gp:geopriv> <dm:deviceid>mac: ab</dm:deviceid> <dm:timestamp> t20:57:29z</dm:timestamp> </dm:device> </tuple> </presence> --boundary1-- GPS obtained location information can be encoded in a PIDF-LO document in a few different ways depending on the accuracy, such as a Circle, Ellipse, or Ellipsoid. The detailed encoding of location is described in RFC ) Protocol mechanisms to request and obtain location information A number of protocols have been developed to allow an entity to request location and to obtain it in response. The designs vary based on what input information is utilised and into what other T5.4: Routing, Location-based information and caller ID 7

8 communication protocols the message exchanges are embedded. The description in this document will only focus on the protocol mechanisms that are relevant for the REACH-112 project rather than a complete survey of all protocols available on the market. Two protocol mechanisms may be used in the REACH-112 pilot for obtaining location information, namely 1) A protocol for allowing a Nokia phone to communicate with a Nokia Location Database. 2) A protocol for allowing the French PSAPs to obtain location information from the France Telecom location server. In case #1 the interaction is based on a standardised protocol, namely SUPL, but since no network operator in the pilot countries utilises this protocol and, in case of the Nokia Location Database, only Nokia phones are allowed to access the database no interoperability need arises. In case #2 the interaction is based on a proprietary HTTP-based protocols for retrieving location information, as documented in 4) Procedures for location determination. Before location can be encoded, put into a protocol for delivery and utilised it first needs to be determined. Location information can be entered by a user ("manual configuration"), measured by the end host, can be delivered to the end system by some protocol or measured by a third party. The actual process of location determination is largely outside the scope of the REACH-112 project but manual configuration, GPS usage, and the usage of location servers is relevant. Many VoIP deployments allow their users to manually enter location information for later usage with emergency services. Typically, the users enter their home address into a web-based form and this data would then be used for emergency service call routing and also delivered to PSAP operators. This mechanism is primarily suitable for user s utilising fixed network deployments (such as Cable and DSL networks) rather than cellular networks where the current user s location changes continuously. For nomadic users this approach already becomes very cumbersome for end users. While this mechanism clearly has limitations it is still a useful approach in absence of other techniques. For devices like laptops and in particular mobile phones the usage of GPS is a promising technique that is able to provide highly accuracy. While it has also has limitations (for example when used indoor) and may need a fair amount of time to provide the initial location fix it is a promising technique. In the REACH112 project many of the mobile end devices have GPS available and from an implementation point of view only the appropriate Application Programmable Interfaces (APIs) need to used in order to gain access to GPS information. Caller Identity Caller identity information is another important information element that is provided to the PSAP in case of an emergency call. In the more generic form we speak about data that is associated with the person initiating the call. Caller identity comes in the form of the calling party s SIP Uniform Resource Identifier (URI) that can be used for a callback in case the communication got interrupted prematurely and further information needs to be obtained by the call taker. While the caller s identity is clearly useful for emergency services purposes it s main usage is for regular peer-to-peer communication in Total Conversation: knowing the calling party for decision making is a critical aspect for a communication system. The SIP protocol suite has a number of specifications that provide caller identity information and this section describes the main mechanisms. The mechanisms can be clustered into three categories for the purpose of this document, as shown in Figure 2. There are four distinct building blocks that need to be considered, namely T5.4: Routing, Location-based information and caller ID 8

9 1) the process of verifying the user s identity. The VSP/ASP s infrastructure elements authenticate the user. This can, for example, happen via the basic SIP authentication mechanisms (such as digest authentication). 2) the process of asserting the previously verified identity. The previously authenticated identity is not only important for the VSP/ASP but for end-to-end communication of interest to the remote party as well. The VSP/ASP can assert this identity towards other parties using mechanisms, such as SIP Identity described in RFC 4774 or P-Asserted-Identity described in RFC The main difference between the two mechanisms, as described in more detail later is that the cryptographic assurance provided with SIP Identity is provided with P-Assert-Identity using a non-cryptographic technique called chain-of-trust. 3) SIP signalling security. This ensures that an adversary cannot inject fake signalling messages, eavesdrop on the communication, etc. Transport Layer Security (TLS) is one possible protocol providing such security support function. 4) Media security. Since the ultimate goal of the communication establishment is in the exchange of data between the two end points the security properties need to cover the full range of communication exchanges, including the media exchange. SRTP is the established standard for securing the Real-Time Transport Protocol (RTP). In order to enable SRTP cryptographic keys need to be established between the two communication parties. The Security Description (SDES), described in RFC 4568, and DTLS-SRTP, described in RFC 5763, are two mechanisms to do so. Figure 2: Identity and Security Architecture Overview. For details about the identity and security mechanisms the reader is referred to 0 T5.4: Routing, Location-based information and caller ID 9

10 Appendix D: Identity and Security Mechanisms. Implementation Status This section summarises the feedback from a questionnaire distributed to the different project members. The main purpose of the questionnaire was to get a better understanding what implementation support regarding location support and caller-id is available. The response is clustered into two groups, namely caller-id and location, and the provided information reflects the status around the April-May 2010 timeframe when the responses to the questionnaire were returned. Caller Identity To authenticate the user most implementations only support the basic functionality of the SIP specification, namely HTTP Digest (RFC261). Nokia reported more sophisticated authentication capabilities with Digest AKA (RFC3310), IMS AKA (TS ) and Early IMS authentication (TR ). Support for P-Asserted-Identity was stated as not being available while SIP Identity was implemented by Aupix. IVES, however, stated plans to implemented PAI. 4CT indicates support for SRTP. No information is available regarding the key management. SIP signalling security mechanisms do not seem to be available in the implementations. Implementation support for GRUU is not available. Location Support for manually entered location is available for all pilot countries, except for Sweden. Many of the mobile devices come with GPS support, which can be used for location support. Nearly all of the current members have not implemented location support yet. The APIs for access to the GPS receiver (in the operating system or the used programming framework) are claimed to be available (for example, based on response from Nokia, and IVES). SIP Location Conveyance was not implemented by any of the parties (which is not surprising given the answer about the location implementation support). There is interest in implementing SIP location conveyance (e.g. IVES). Location configuration protocols and location dereferencing protocols are not implemented with the exception for Nokia and FT. As described in the document these two implementations either do not allow interoperability or are proprietary. Nevertheless, they are very useful for the purpose being investigated. There is also interest to provide the support for an IP-to-geolocation service (e.g. IVES). Recommendations and Guidelines to the Project Recommendations I. Location Information Recommendation L-1: Use PIDF-LO for encoding of location information (civic as well as geodetic location information). T5.4: Routing, Location-based information and caller ID 10

11 Recommendation L-2: Use the ability to carry a PIDF-LO MIME object in SIP (as suggested with Location Conveyance) for the delivery of location information in SIP. Note that this does not require every feature of SIP Location Conveyance to be implemented since the scenarios in REACH112 only provide end host provided location information and not a proxy to insert a location on the fly. Recommendation L-3: Support manual configuration of location information for users in fixed network deployments. This requires a user interface to allow users to enter their information. For user-entered information it is recommended to validate the received input against an authoritative address guide containing existing civic addresses. Recommendation L-4: Make use of GPS enabled devices for accurate location. Due to the nature of GPS mid-session location updates (e.g. via re-invites or SIP UPDATE) need to be supported. Recommendation L-5: For cellular devices information about cell identifiers should be transmitted in SIP to allow the cell sector where the emergency caller is located to be determined. II. Caller Identity Recommendation I-1: In addition to the authentication verification capability (e.g. via SIP digest) also support the facility to assert the user s identity with P-Asserted-Identity. Recommendation I-2: To provide protection of SIP signalling offer support for Transport Layer Security (TLS). Recommendation I-3: For security of media traffic exchanged between the two parties (particularly in the non-emergency services communication) provide SRTP for media security. To establish keying material for usage with SRTP at least support SDES. III. Emergency Call Signalling Recommendation S-1: End hosts SIP stacks must be enhanced to detect emergency dial strings entered by users to initiate an emergency call. Due to the limited nature of many of the devices in the pilot countries and their inability to be moved to be used in a generic context (and even in another pilot region) it is recommended to pre-configure a list of emergency dial strings into those devices. For devices that can, however, be used in different environment a dynamic discovery procedure is recommended. In the long-run an automatic configuration will be required to avoid surprises for user s seeking for help. Recommendation S-2: To mark emergency calls in SIP signaling the usage of the Service URNs is recommended. Country-specific Circumstances This section summarises aspects that are unique for the different pilot countries. The description refers to the high level setup shown in Figure 1 but we replicate the figures to illustrate the participants in the country-specific pilots. Important: The figures show the parties that provide the software rather than those who provide the hardware or those who run the software. Swedish Pilot T5.4: Routing, Location-based information and caller ID 11

12 Figure 3: Swedish Pilot Setup. Figure 3 shows the setup of the Swedish pilot with devices in the form of: Special hardware devices (Internet Tablets provided by Omnitor) Mobile phones (E71 provided by Nokia) Laptops (with software provided by Omnitor) The client software from Omnitor is a SIP client. that is not available as open source. The same is true for the SIP client on the Nokia devices. Currently, there is no location support provided in the Swedish pilot for the Omnitor devices (including the lack of support for manual registration of the user s location). The emergency number is recognised by the VSP/ASP proxy provided by Omnitor. Basic SIP security is offered for authentication but no TLS call signalling is provided or media security. The relay for sign language interpretation is provided by a third-party; the same is true for the text relay. The PSAP is operated by SOS Alarm and Omnitor will install 2 PCs onsite to provide IP-based emergency services support. Recommendations: Since the Nokia phones are equipped with GPS and may be able to utilise circuit-switched location information or the Nokia location database there is a chance to offer location support for emergency calling within the Swedish pilot. For improved security between the end device and the VSP the Nokia device could be used but still the VSP/ASP proxy by Omnitor would have to offer the corresponding support to utilise the functionality. To utilise end-to-end media security the end host can interact with two possible end points, namely the third party relay and Omnitor s PSAP. Currently, these two devices do not support SRTP and the corresponding key management. Providing identity support is fairly simple in case of emergency communication towards the Omnitor PCs located at SOS Alarm when Omnitor s VSP/ASP proxy acts as an Authentication Service. In this case the identity assertion is provided by Omnitor s proxy and verified by Omnitor s SIP server PSAP. Interoperability challenges arise in case of roaming where the caller uses a different VSP/ASP. For end-to-end security with the PSAP the Omnitor SIP server has to be upgraded. T5.4: Routing, Location-based information and caller ID 12

13 Spain Figure 4: Spanish Pilot Setup. Figure 4 shows the setup of the Spanish pilot with devices in the form of PCs/Laptops (provided by Siemens) Mobile phones (E71 provided by Nokia) The software used at the Siemens devices is based on an open source SIP stack (see that was originally developed in a project where Omnitor was involved. It should be noted that this SIP stack is different to the one used by Omnitor in Sweden. This implementation offers a good real-time text implementation but does not offer location support or anything beyond very basic authentication security support (based on username and password). Neither media security nor signalling security is offered. Recommendations: Manual location configuration support by the user is provided. More details are, however, needed to verify the approach taken with those from other pilot countries (e.g. screenshots). No location server support is provided although the dialog with Telefonica could be initiated since they are providing location support in the EU funded PEACE project also for emergency services purposes. France T5.4: Routing, Location-based information and caller ID 13

14 Figure 5: French Pilot Setup. Figure 5 shows the setup of the French pilot with devices from IVÈS. The important aspect in the French pilot is the usage of location from France Telecom using an HTTP-based location retrieval function. More detail about the location API can be found here: Support for manual location provisioning is envisioned in the pilot as well as the usage of a GeoIP functionality for lookup at the VSP to determine the country of the emergency caller. Recommendations: The usage of FTs location for mobile devices via the location API will offer a unique aspect in the project given the small number of ISPs in REACH112. For the usage with this pilot there are two constraints: a) This API can be used for France Telecom/Orange customers only. b) The exposure of location information needs to be explicitly confirmed either in advance to the call or at the call time). Providing additional support for manual configuration and the usage of GeoIP is recommended for those cases where location cannot be obtained otherwise. Netherlands Figure 6: Pilot Setup in the Netherlands. T5.4: Routing, Location-based information and caller ID 14

15 Figure 6 shows the setup of the pilot in the Netherlands with only mobile devices. The primary devices being used are Blackberry phones equipped with GPS. If possible then Nokia E71 phones will be used as well. The implementation supports text, voice and video. The VSP/ASP proxy is provided by 4CTelecom and the same is true for the software running on the PSAPs operated by KLPD. Recommendations: For location information the GPS information will be used. The GPS receiver in the mobile end devices will accessed by the SIP client software via a Application Programming Interface to obtain raw location data. This location data will then be encoded to fit into a PIDF-LO document to be delivered to the PSAP. Additionally, there is the plan to convey cell-id information. This information can be delivered in SIP based on the header fields defined in RFC 3455, such as P-Access- Network-Info header. Manual configuration by users is in this pilot scenario not useful. UK Figure 7: UK Pilot Setup. Figure 7 shows the setup of the UK pilot with devices from AUPIX based on laptops an Internet tablets. The end host software is available as a downloadable application. The VSP/ASP part is also provided by AUPIX based on various components, including Asterisk. The code for video and realtime text handling in Asterisk is in fact based by initial work from John Martin (Aupix) This scenario is particularly interesting since all components are provided by a single party. Recommendations: Regarding location information mechanisms are provided to allow users to manually enter their location information. Similarly with other pilot countries currently there is no implementation support for location, and caller identity security. T5.4: Routing, Location-based information and caller ID 15

16 To provide location information for the case the user has not manually provided location information in the case of fixed devices GeoIP should be provided. It is important that the IP addressed used for the lookup has to be the address obtained from the ISP rather than IP addresses obtained via IP tunnels or through VPNs. Conclusion The work on standardising IP-based emergency services is ongoing for many years already and most of the work has been completed already (including open source implementations that are available). While this progress gives hope there are also limitations that can be seen within the REACH-112 project. The challenges particularly concern two areas: 1. The need for interoperability is not visible within the pilot countries since only very few parties participate in the communication exchange. 2. Availability of accurate location information from ISPs to support automatic location configuration for IP-based devices 3. Widespread deployment of an emergency call routing infrastructure (using LoST) The first challenge needs to be addressed in the following ways: Support of end host roaming: If a large range of end devices are used in the different pilot countries then interoperability problems between the end host and the VSP/ASP, and also along the entire call signalling chain become visible. Roaming of end devices needs to be demonstrated to ensure that call routing functionality is tested. For example, a call would then start at the device in Spain and would be directed to a VSP in the UK then this VSP would have to determine where to route the call next. If location-based routing is used then this UK-based VSP would have to route it to a PSAP in Spain. This requires different VSPs/ASPs to interact with PSAPs from other countries. Challenges #2 and #3 are based on the unclear division of responsibilities. While it is clear that someone has to provide emergency services, the number of incentives, given the liability and unclear funding models, is rather low. Regulators try not to dictate specific business models or solution approaches for emergency services and this is also true in general. However, it is uncertain whether the absence of specific guidance on how to share responsibilities will lead to a robust emergency services infrastructure for IP-based devices. To explain the challenges we describe the most fundamental difference between the IP-based communication infrastructure and the circuit-switched environment: The Internet with the Internet Protocol (IP) provides a generic communication network where those providing the network infrastructure (ISP) to route packets are not necessarily providing the application layer services, such as voice, video and real-time communication (ASP/VSP). Since fewer parties are involved when deploying new services on the Internet the speed of innovation is faster. Location Information Challenge The ISP is still the entity that knows the end hosts location best and most reliable due to the physical proximity. As explained earlier in this report location information is required for three purposes: 1) Dispatch of first responders 2) Emergency call routing 3) Recognition of the appropriate emergency services numbers T5.4: Routing, Location-based information and caller ID 16

17 Depending on the emergency services infrastructure setup only very rough location information is required for item #2 call routing and item #3 only requires country-level precision. Location for first responders, however, requires accurate location information. Incentives have to be provided to the ISP to invest in infrastructure (such as location servers). Currently, these incentives do not seem to exist. In the REACH-112 project only in the French pilot region some amount of location information is available from the ISP, France Telecom. In all other regions work-a-rounds have to be created. Unfortunately, a large number of ISPs need to be involved and the project only has a single ISP as a project partner. It is obvious that on this topic the consortium can do very few since the decisions should be taken at higher level by national or supranational telecommunications regulators. The reliability of the provision of location information can only be ensured via the full collaboration of ISPs. The EENA has already informed the European Commission and several national regulatory authorities about the need for incentives and/or appropriate regulation of the ISPs so that to ensure IP-access to emergency services. Call Routing In the area of call routing the situation is similar to location, namely unclear responsibilities. While there are clear benefits from allowing users to discover the emergency numbers used in a specific region automatically without user involvement and to have ways to discover the PSAP that is responsible for a specific region but it is not clear who s responsibility it is to establish the serverside infrastructure. Those who benefit from the infrastructure, such as end devices and VSPs/ASPs, do not have the means to setup the infrastructure since they lack the data. The authoritative data is available with the emergency services organisations but they typically lack the funding to operate the infrastructure. When no infrastructure is available then there are no incentives for end devices and VSPs/ASPs to integrate the available code into their software; a chicken-and-egg problem. To some extend the problem is less difficult to solve than the location problem since a single entity, such as an emergency services organisation, can offer the functionality to all entities within their region of influence (such as a country). This is not possible with location since every ISP has to provide location server support. Summary As a summary of this report we have to conclude that very little location support, no location-based call routing, and very basic identity support is available in the project overall. There are indications that future implementation efforts will improve availability of location via manual configuration, via GPS, and also (in case of the French pilot) from France Telecom, as an ISP. As such, there is still a fair amount of integration work that needs to be done to provide basic support for IP-based emergency calling in this Total Conversation project. The solutions highlighted are adapted to the nature of the consortium and the general context that does not encourage or oblige the ISPs to implement the necessary components. It should however be noted that this reports proposes several ways to go forward with location, routing and caller-id and clearly intends to improve the situation. T5.4: Routing, Location-based information and caller ID 17

18 Appendix Appendix A: Questionnaire for T5.4 Introduction The task for the work in the task T5.4 is to develop a report that will serve as input to the implementation and deployment work in the different countries. The aim is to help every pilot country in implementing appropriate routing so that emergency calls get to the right PSAP and provide automatic caller-location so that dispatchers can intervene at the place of incident. In order to accomplish this goal it is necessary to (1) Investigate and chapter the different architectural choices with respect to the topics of callerlocation, call-routing, and additional data. (2) Analyse which partner serves which role in the different pilot locations. Once the role is identified it is relatively easy to identify what functionality has to be offered (among the choices being offered in the solution architecture). The IP-based emergency services architectures differentiate a few roles that have different responsibilities for offering the complete end-to-end functionality. These roles are: * Internet Service Provider (ISP) * Voice Service Provider (VSP), or in a more generic form Application Service Provider (ASP) * Emergency Service Provider (that operates a PSAP) and vendors of equipment for those. * End Device Note that a specific partner may provide multiple roles. The terms are described in You can also look at NENA Glossary: Questionnaire 1) Please indicate the roles you act in the different pilot countries 2) State-of-the-Art Analysis For ISPs: Location: Please describe the Location Server technology you are using. For what network technologies can the Location Server be used in the pilot project? Are there technical/operational/legal/ethical constraints you are aware of with the usage of this Location Server for the pilot? T5.4: Routing, Location-based information and caller ID 18

19 For VSPs/ASPs:(Focused on those offering service in the network including relay providers.) Caller Identity: Are you offering caller identity information using P-Asserted-Identity? Are you offering caller identity information using SIP Identity? Additional Data: Are you offering the ability to carry additional data (beyond location and identity) in SIP messages? Location: Do you offer your end users the possibility to manually enter their location when they subscribe to your service? Are you offering the ability to attach, carry, and process location in SIP? Do you implement SIP Location Conveyance according to What location dereference protocols are implemented already (such as MLP, HELD Deref, HELD Identity, LOCSIP, SIP presence)? Location-based Call Routing: Are you offering any mechanisms to perform location-based call routing? For Emergency Services Providers and vendors of emergency services providers: Caller Identity: How do you process incoming caller identity information? Do you support P-Asserted-Identity and SIP Identity? What are your abilities for call-back? Are you able to differentiate the AoR and the GRUU for call-back? Additional Data: Do you have mechanisms to retrieve additional data and to display it? Location: How do you process and display incoming location information based on the SIP Location Conveyance standard? What location dereference protocols are implemented already (such as MLP, HELD Deref, HELD Identity, LOCSIP, SIP presence)? Are you able to process location updates during the call? T5.4: Routing, Location-based information and caller ID 19

20 For End Device manufacturers and End Device Software Vendors/Developers:(Note: Responses need to be separated for different hardware and software platforms used in the pilot.) Caller Identity: What user authentication mechanisms do you implement? What SIP signalling security mechanisms do you implement? Do you implement secure RTP (SRTP)? If yes, what key management do you offer? Location: Are GPS receivers available for the device? What APIs exist to access location information within the device/platform? What are their capabilities and constraints? Have they been used already in practice? What protocols for access to a Location Server are available in your device/platform? Are you offering the ability to attach location in SIP according to In particular, are you able to send multi-party MIME bodies in your SIP messages and are you able to offer location updates during on ongoing session? 3) Anticipated Functionality Considering the responses you provided in (2) what functionality, if already investigated, do you plan to offer/implement during the lifetime of the project? Please detail your plans and your wishes. T5.4: Routing, Location-based information and caller ID 20

21 Appendix B: Implementation Example based on Skype This section provides an example implementation based on a deployed VoIP software from Skype as used in the UK for emergency services. Skype users are given the possibility to manually enter their address, which helps in case of fixed phone deployments. This is shown in Figure 8 (for a user with his or her home location in Finland) vs. Figure 9 for a user with his or her home location in the UK where emergency support is available. Figure 8: Home Location where emergency calling is NOT available. T5.4: Routing, Location-based information and caller ID 21

22 Figure 9: Home Location where emergency calling is supported. Figure 10 shows the state machine as implemented on a Skype end point. The state machine determines how the Skype program executes instructions and therefore how it behaves. First, the emergency call needs to be detected based on the user entering the emergency dial strings. Skype uses the following pre-provisioned numbers (that can be modified using Skype's software update mechanism): T5.4: Routing, Location-based information and caller ID 22

23 This initial decision then leads to the emergency call procedures. The next decision is based on the user s manually entered location information ( country from profile ) since the emergency call procedure is only available in the UK and not in other countries. Hence, a determination needs to be made about the user s location. If the user did not provide information into their profile data the geo-ip process is started, which evaluates the current location of the user using the publically available data based on the IP address. Such a lookup is not accurate and can lead to errors particularly when the user is utilising various tunneling and mobility protocols. Still, for determining the country the user is currently located this method provides an additional data point. Finally, the emergency call is executed and the call will be routed to a Skype gateway that then forwards the call to a BT based PSTN entity. Since the IP-based call is currently forwarded to the PSTN and no interworking with the existing real-time text system is provided only voice emergency calls are supported. Furthermore, lacking the protocol support for conveying location information to the stage-1 PSAP the available location information is not forwarded from Skype towards BT s network. Figure 10: State Machine for Processing Emergency Calls. The following two figures show screen shots for emergency call situations as experienced by the user. Figure 11 shows a successful emergency call setup where the user is provided status information about the dynamically determined location information. Figure 12 on the other hand provides the user with information that he is currently located in the US and that emergency services support is not provided in the US. The user is, however, provided with the option to re-configure its country to proceed with the emergency call setup. T5.4: Routing, Location-based information and caller ID 23

24 Figure 11: Successful Emergency Call Figure 12: Unsuccessful Emergency Call. T5.4: Routing, Location-based information and caller ID 24

25 Appendix C: Pointers to Open Source Code The following list includes a few valuable pointers to open source implementations and other tools. Displaying PIDF-LOs in a Browser SIP based emergency services client implementation: Ecritdroid: This application adds support for ECRIT (Emergency Context Resolution with Internet Technologies) calling to your Android phone. Asterisk Patch, which can be used to get location by value out of the (multipart) body of a SIP message: LoST client, server Internet Geolocation Toolkit (includes LIS discovery, and HELD client, DHCP client, LoST client) LoST server, and client (including a Web and Ajax based client) Krakau LoST server & client. Also includes code for SIP stacks T5.4: Routing, Location-based information and caller ID 25

26 Appendix D: Identity and Security Mechanisms This section of the appendix illustrates the identity and security mechanisms in more detail. RFC 3325: P-Asserted-Identity (PAI) The basic principle of PAI is based on a chain of trust. After authenticating the user, the VSP/ASP s SIP proxy adds the P-Asserted-Identity header to the SIP message. This header carries the authenticated identity (SIP URI) of the user. The P-Asserted-Identity header is protected only in a hop-by-hop fashion between the SIP proxies along the path. The mechanism can only be used within a trust domain in which the SIP proxies and UAs communicate securely and the proxies are mutually trusted. RFC 4474: SIP Identity SIP Identity extends the PAI concept with a cryptographic identity assurance by sending SIP messages via an Authentication Service. The authentication service authenticates the user (e.g. by HTTP Digest) and verifies the SIP identity written into the From header of the SIP request. This is identical to the PAI scheme. Then, the authentication service authorises population of From header and digitally signs the message before forwarding it towards the ultimate recipient, using the Identity header. Within the forwarded SIP request the authentication service also provides a reference (HTTP URI) to its own domain certificate, using Identity-Info header. The recipient of the SIP message (e.g. PSAP or the other communication partner) performs the following actions when it to verify the authenticated identity. First, it fetches and validates the certificate of the authentication service. Then, it verifies the signature of the SIP message and the identity of the user. Finally, it checks the value of signed Date header to protect against replay attacks. The diagram below shows an example exchange graphically. Figure 13: SIP Identity Example Exchange. RFC 4568: Security Description SDES is the simplest key distribution mechanism for establishing Secure Real-time Transport Protocol (SRTP) communication. Both endpoints announce their encryption keys in the Session Description Protocol (SDP) in T5.4: Routing, Location-based information and caller ID 26

27 clear text. To provide protection against an attacker the SIP signaling communication needs to be confidentiality protected, for example using TLS. A attribute used by SDES to announce their encryption key is "a=crypto" and describes the cryptographic suite, key parameters, and session parameters for the preceding unicast media line The following figure illustrates the protocol exchange graphically: Figure 14: SDES for SRTP. RFC 5763: DTLS-SRTP RFC 5763 specifies how to use SIP to establish a Secure Real-time Transport Protocol (SRTP) security context using the Datagram Transport Layer Security (DTLS) protocol. It describes a mechanism of transporting a fingerprint attribute in the Session Description Protocol (SDP) that identifies the key that will be presented during the DTLS handshake. The key exchange travels along the media path as opposed to the signalling path. The SIP Identity mechanism can be used to protect the integrity of the fingerprint attribute from modification by intermediate proxies. The following figure illustrates the protocol exchange graphically: T5.4: Routing, Location-based information and caller ID 27

28 Figure 15: DTLS-SRTP for SRTP. The exchange can be described as follows: With the initial SIP signaling message a fingerprint of the certificate is exchanged between the two parties. Then, the DTLS handshake (with a special ciphersuite for establishing SRTP keying material) is performed along the media path. When the handshake completes the DTLS establishes the keying material for SRTP. T5.4: Routing, Location-based information and caller ID 28

Internet Standards - Emergency Services

Internet Standards - Emergency Services Internet Standards - Emergency Services Hannes Tschofenig (Chair IETF ECRIT Working Group) Mail comments to [email protected] and/or [email protected]. Architectural Considerations Layer 7 VoIP, Inc.

More information

Update on REACH112 & NG112

Update on REACH112 & NG112 Update on REACH112 & NG112 Gary Machado EENA About REACH112 The project: 3-year project until June 2012 20 partners and 5 pilot countries (but Europe wide guidelines) Co-funded by the EC Objectives: Improve

More information

Request for Comments: 4579. August 2006

Request for Comments: 4579. August 2006 Network Working Group Request for Comments: 4579 BCP: 119 Category: Best Current Practice A. Johnston Avaya O. Levin Microsoft Corporation August 2006 Status of This Memo Session Initiation Protocol (SIP)

More information

Next Generation 112 Explained

Next Generation 112 Explained Next Generation 112 Explained Riga 18 of April 2012 Presented by Cristina Lumbreras Prepared with the help of Hannes Tschofenig Agenda 1. What is a Next Generation Network? 2. Next Generation Emergency

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Session 1: Standardization and Regulation Emergency Call Standardization

Session 1: Standardization and Regulation Emergency Call Standardization Session 1: Standardization and Regulation Emergency Call Standardization Hannes Tschofenig ECRIT IETF WG Chair Siemens AG Corporate Technology Agenda Big Picture Determining Location Identify Emergency

More information

SIP Essentials Training

SIP Essentials Training SIP Essentials Training 5 Day Course Lecture & Labs COURSE DESCRIPTION Learn Session Initiation Protocol and important protocols related to SIP implementations. Thoroughly study the SIP protocol through

More information

AV@ANZA Formación en Tecnologías Avanzadas

AV@ANZA Formación en Tecnologías Avanzadas SISTEMAS DE SEÑALIZACION SIP I & II (@-SIP1&2) Contenido 1. Why SIP? Gain an understanding of why SIP is a valuable protocol despite competing technologies like ISDN, SS7, H.323, MEGACO, SGCP, MGCP, and

More information

White Paper. Is VoIP Without E9-1-1 Worth the Risk? Challenges, Approaches, and Recommendations for VoIP Service Providers

White Paper. Is VoIP Without E9-1-1 Worth the Risk? Challenges, Approaches, and Recommendations for VoIP Service Providers TeleCommunication Systems, Inc. www.telecomsys.com Is VoIP Without E9-1-1 Worth the Risk? Challenges, Approaches, and Recommendations for VoIP Service Providers Notices 2004 TeleCommunication Systems,

More information

How to make free phone calls and influence people by the grugq

How to make free phone calls and influence people by the grugq VoIPhreaking How to make free phone calls and influence people by the grugq Agenda Introduction VoIP Overview Security Conclusion Voice over IP (VoIP) Good News Other News Cheap phone calls Explosive growth

More information

Secured Communications using Linphone & Flexisip

Secured Communications using Linphone & Flexisip Secured Communications using Linphone & Flexisip Solution description Office: Le Trident Bat D 34, avenue de l Europe 38100 Grenoble France Tel. : +33 (0)9 52 63 65 05 Headquarters: 12, allée des Genêts

More information

Cisco Virtual Office Express

Cisco Virtual Office Express . Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside

More information

Chapter 2 PSTN and VoIP Services Context

Chapter 2 PSTN and VoIP Services Context Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using

More information

VoIP Emergency Calling. Foundations and Practice

VoIP Emergency Calling. Foundations and Practice Brochure More information from http://www.researchandmarkets.com/reports/2180782/ VoIP Emergency Calling. Foundations and Practice Description: This book provides a comprehensive view of the emerging standards

More information

EENA NG112 Committee. Long Term Definition Document Conference call 1 of February 2012

EENA NG112 Committee. Long Term Definition Document Conference call 1 of February 2012 EENA NG112 Committee Long Term Definition Document Conference call 1 of February 2012 Agenda 1. Next Generation Emergency Services Overview Background NG112 Scope meets EENA Operational Requirements 2.

More information

This specification this document to get an official version of this User Network Interface Specification

This specification this document to get an official version of this User Network Interface Specification This specification describes the situation of the Proximus network and services. It will be subject to modifications for corrections or when the network or the services will be modified. Please take into

More information

ECC Report 193. Emergency Calls in VoIP Environment: Compilation of Recent Studies

ECC Report 193. Emergency Calls in VoIP Environment: Compilation of Recent Studies ECC Report 193 Emergency Calls in VoIP Environment: Compilation of Recent Studies Approved 21 November 2012 Page 2 1 EXECUTIVE SUMMARY This new ECC Report deals with Emergency Calls in VoIP Environment,

More information

An outline of the security threats that face SIP based VoIP and other real-time applications

An outline of the security threats that face SIP based VoIP and other real-time applications A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications

More information

Overview ENUM ENUM. VoIP Introduction (2/2) VoIP Introduction (1/2)

Overview ENUM ENUM. VoIP Introduction (2/2) VoIP Introduction (1/2) Overview Voice-over over-ip (VoIP) ENUM VoIP Introduction Basic PSTN Concepts and SS7 Old Private Telephony Solutions Internet Telephony and Services VoIP-PSTN Interoperability IP PBX Network Convergence

More information

Need for Signaling and Call Control

Need for Signaling and Call Control Need for Signaling and Call Control VoIP Signaling In a traditional voice network, call establishment, progress, and termination are managed by interpreting and propagating signals. Transporting voice

More information

Cisco Unified Communications Manager 7.0

Cisco Unified Communications Manager 7.0 Cisco Unified Communications Manager 7.0 Cisco Unified Communications Solutions unify voice, video, data, and mobile applications on fixed and mobile networks, enabling easy collaboration every time from

More information

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

Session Initiation Protocol (SIP) The Emerging System in IP Telephony Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia

More information

The 4-1-1 on NG9-1-1 Part I of III

The 4-1-1 on NG9-1-1 Part I of III The 4-1-1 on NG9-1-1 Part I of III Presented By Guy Churchouse, ENP, CCNA Voice, SSCA Director of Sales, Revcord Contents Overview... 2 Where We Were, Where We Are Now, And Where We Are Going... 2 Where

More information

Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0

Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0 Abstract These Application Notes describe the procedures for configuring

More information

How To Guide. SIP Trunking Configuration Using the SIP Trunk Page

How To Guide. SIP Trunking Configuration Using the SIP Trunk Page How To Guide SIP Trunking Configuration Using the SIP Trunk Page For the Ingate SIParators and Firewalls using software release 4.9.2 or later. Updated to show features available from release 4.10.x May

More information

Internet Geolocation and Location-Based Services. Richard Barnes BBN Technologies IETF GEOPRIV Co-Chair Emergency Services Workshop Co-Chair

Internet Geolocation and Location-Based Services. Richard Barnes BBN Technologies IETF GEOPRIV Co-Chair Emergency Services Workshop Co-Chair Internet Geolocation and Location-Based Services Richard Barnes BBN Technologies IETF GEOPRIV Co-Chair Emergency Services Workshop Co-Chair Agenda Geolocation is getting to be a big deal ISPs have a central

More information

Key Elements of a Successful SIP Device Provisioning System

Key Elements of a Successful SIP Device Provisioning System Key Elements of a Successful SIP Device Provisioning System A white paper by Incognito Software April, 2006 2006 Incognito Software Inc. All rights reserved. Page 1 of 6 Key Elements of a Successful SIP

More information

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general

More information

ETSI TR 102 476 V1.1.1 (2008-07) Technical Report

ETSI TR 102 476 V1.1.1 (2008-07) Technical Report TR 102 476 V1.1.1 (2008-07) Technical Report Emergency Communications (EMTEL); Emergency calls and VoIP: possible short and long term solutions and standardization activities 2 TR 102 476 V1.1.1 (2008-07)

More information

VOICE OVER IP SECURITY

VOICE OVER IP SECURITY VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD NATIONAL SECURITY AGENCY Ft. George G. Meade, MD Serial: I732-010R-2008 30 April 2008 Network Infrastructure Division Systems and Network Analysis Center Activating Authentication and Encryption for Cisco

More information

Implementing Intercluster Lookup Service

Implementing Intercluster Lookup Service Appendix 11 Implementing Intercluster Lookup Service Overview When using the Session Initiation Protocol (SIP), it is possible to use the Uniform Resource Identifier (URI) format for addressing an end

More information

SIP : Session Initiation Protocol

SIP : Session Initiation Protocol : Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification

More information

How to Configure the Allworx 6x, 24x and 48x for use with Integra Telecom SIP Solutions

How to Configure the Allworx 6x, 24x and 48x for use with Integra Telecom SIP Solutions How to Configure the Allworx 6x, 24x and 48x for use with Integra Telecom SIP Solutions Overview: This document provides a reference for configuration of the Allworx 6x IP PBX to connect to Integra Telecom

More information

Marratech Technology Whitepaper

Marratech Technology Whitepaper Marratech Technology Whitepaper Marratech s technology builds on many years of focused R&D and key reference deployments. It has evolved into a market leading platform for Real Time Collaboration (RTC)

More information

SIP Security Controllers. Product Overview

SIP Security Controllers. Product Overview SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running

More information

Looking For Trouble: Emergency Call Handling Using Aruba Wireless LANs

Looking For Trouble: Emergency Call Handling Using Aruba Wireless LANs Tech Brief Looking For Trouble: Emergency Call Handling Using Aruba Wireless LANs March 2009 Peter Thornycroft Aruba Networks 1 Introduction Should we or a colleague need to make an emergency services

More information

Location in SIP/IP Core (LOCSIP)

Location in SIP/IP Core (LOCSIP) in SIP/IP Core (LOCSIP) Conveyance with IMS: the OMA LOCSIP Service Enabler Mike Loushine / Don Lukacs Telcordia Applied Research 2009, Telcordia Technologies Inc. in SIP/IP Core (LOCSIP) Topics General

More information

Managing SIP traffic with Zeus Traffic Manager

Managing SIP traffic with Zeus Traffic Manager White Paper Managing SIP traffic with Zeus Traffic Manager Zeus. Why wait Contents High-Availability and Scalable Voice-over-IP Services... 3 What is SIP?... 3 Architecture of a SIP-based Service... 4

More information

Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University

Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University Session Initiation Protocol oco (SIP) Part II Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University Email: [email protected]

More information

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens Nick Marly, Dominique Chantrain, Jurgen Hofkens Alcatel Francis Wellesplein 1 B-2018 Antwerp Belgium Key Theme T3 Tel : (+32) 3 240 7767 Fax : (+32) 3 240 8485 E-mail : [email protected] Tel : (+32)

More information

How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications

How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications Small businesses will find this booklet useful for learning how VoIP works and for clarifying

More information

A Comparative Study of Signalling Protocols Used In VoIP

A Comparative Study of Signalling Protocols Used In VoIP A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.

More information

SIP A Technology Deep Dive

SIP A Technology Deep Dive SIP A Technology Deep Dive Anshu Prasad Product Line Manager, Mitel June 2010 Laith Zalzalah Director, Mitel NetSolutions What is SIP? Session Initiation Protocol (SIP) is a signaling protocol for establishing

More information

VoIP. Overview. Jakob Aleksander Libak [email protected]. Introduction Pros and cons Protocols Services Conclusion

VoIP. Overview. Jakob Aleksander Libak jakobal@ifi.uio.no. Introduction Pros and cons Protocols Services Conclusion VoIP Jakob Aleksander Libak [email protected] 1 Overview Introduction Pros and cons Protocols Services Conclusion 2 1 Introduction Voice over IP is routing of voice conversations over the internet or

More information

Internet based Emergency calls. Alexander Mayrhofer, nic.at GmbH RIPE 55 Oct 2007, Amsterdam

Internet based Emergency calls. Alexander Mayrhofer, nic.at GmbH RIPE 55 Oct 2007, Amsterdam Internet based Emergency calls Alexander Mayrhofer, nic.at GmbH RIPE 55 Oct 2007, Amsterdam Agenda How "legacy" Emergency Calling works Issues with IP-based emergency calls IETF architecture overview Who

More information

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com WebRTC for Service Providers FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier VoLTE 3GPP Roaming Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends VoLTE Roaming and ion Standard Technology In 3GPP Release 11, the VoLTE roaming and interconnection architecture

More information

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Updated: February 2009 Microsoft Response Point is a small-business phone solution that is designed to be easy to use and

More information

Enterprise Energy Management with JouleX and Cisco EnergyWise

Enterprise Energy Management with JouleX and Cisco EnergyWise Enterprise Energy Management with JouleX and Cisco EnergyWise Introduction Corporate sustainability and enterprise energy management are pressing initiatives for organizations dealing with rising energy

More information

SIP/ SIMPLE : A control architecture for the wired and wireless Internet?

SIP/ SIMPLE : A control architecture for the wired and wireless Internet? / SIMPLE : A control architecture for the wired and wireless Internet? Arup Acharya Network Systems Software Advanced Networking Services (On-Demand Innovation Services) IBM T J Watson Research Center

More information

R&S IP-GATE IP gateway for R&S MKS9680 encryption devices

R&S IP-GATE IP gateway for R&S MKS9680 encryption devices Secure Communications Product Brochure 0.00 R&S IP-GATE IP gateway for encryption devices R&S IP-GATE At a glance The R&S IP-GATE is an IP interface for the encryption device. Used with the, the R&S IP-GATE

More information

CLEARSPAN 911/E911 Overview

CLEARSPAN 911/E911 Overview CLEARSPAN 911/E911 Overview Revision 09012014-1 Proprietary Notice This document contains sensitive and proprietary information and company trade secrets that are critical to Aastra business. This information

More information

Integrate VoIP with your existing network

Integrate VoIP with your existing network Integrate VoIP with your existing network As organisations increasingly recognise and require the benefits voice over Internet Protocol (VoIP) offers, they stop asking "Why?" and start asking "How?". A

More information

Creating your own service profile for SJphone

Creating your own service profile for SJphone SJ Labs, Inc. 2005 All rights reserved SJphone is a registered trademark. No part of this document may be copied, altered, or transferred to, any other media without written, explicit consent from SJ Labs

More information

Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum

Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum V. Rajaravivarma and Farid Farahmand Computer Electronics and Graphics Technology School of Technology,

More information

Service Announcements for Hot-Spots: Enabling Automated Access and Provider Selection for (WLAN-based) Voice. 2005-05-11 Upperside WiFi Voice 2005

Service Announcements for Hot-Spots: Enabling Automated Access and Provider Selection for (WLAN-based) Voice. 2005-05-11 Upperside WiFi Voice 2005 Service Announcements for Hot-Spots: Enabling Automated Access and Provider Selection for (WLAN-based) Voice 2005-05-11 Upperside WiFi Voice 2005 Jörg Ott Dirk Kutscher [email protected] [email protected] 2005

More information

http://webrtcbook.com

http://webrtcbook.com ! This is a sample chapter of WebRTC: APIs and RTCWEB Protocols of the HTML5 Real-Time Web by Alan B. Johnston and Daniel C. Burnett, Second Edition. For more information or to buy the paperback or ebook

More information

Voice over IP (SIP) Milan Milinković [email protected] 30.03.2007.

Voice over IP (SIP) Milan Milinković milez@sbox.tugraz.at 30.03.2007. Voice over IP (SIP) Milan Milinković [email protected] 30.03.2007. Intoduction (1990s) a need for standard protocol which define how computers should connect to one another so they can share media and

More information

SIP and VoIP 1 / 44. SIP and VoIP

SIP and VoIP 1 / 44. SIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels Signaling and VoIP Complexity Basic SIP Architecture Simple SIP Calling Alice Calls Bob Firewalls and NATs SIP URIs Multiple Proxies

More information

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com WebRTC for the Enterprise FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or extracts

More information

Technical Configuration Notes

Technical Configuration Notes MITEL SIP CoE Technical Configuration Notes Configure MCD for use with OpenIP SIP Trunking service SIP CoE 11-4940-00186 NOTICE The information contained in this document is believed to be accurate in

More information

Integration of GSM Module with PC Mother Board (GSM Trunking) WHITE/Technical PAPER. Author: Srinivasa Rao Bommana (srinivasrao.bommana@wipro.

Integration of GSM Module with PC Mother Board (GSM Trunking) WHITE/Technical PAPER. Author: Srinivasa Rao Bommana (srinivasrao.bommana@wipro. (GSM Trunking) WHITE/Technical PAPER Author: Srinivasa Rao Bommana ([email protected]) Table of Contents 1. ABSTRACT... 3 2. INTRODUCTION... 3 3. PROPOSED SYSTEM... 4 4. SOLUTION DESCRIPTION...

More information

Securing SIP Trunks APPLICATION NOTE. www.sipera.com

Securing SIP Trunks APPLICATION NOTE. www.sipera.com APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)

More information

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Abstract These Application Notes describe the steps to configure an Avaya

More information

All-IP Network Emergency Call Support

All-IP Network Emergency Call Support GPP S.R0-0 Version.0 Version Date: October 00 All-IP Network Emergency Call Support Stage Requirements COPYRIGHT GPP and its Organizational Partners claim copyright in this document and individual Organizational

More information

Vulnerabilities in SOHO VoIP Gateways

Vulnerabilities in SOHO VoIP Gateways Vulnerabilities in SOHO VoIP Gateways Is grandma safe? Peter Thermos [email protected] [email protected] 1 Purpose of the study VoIP subscription is growing and therefore security

More information

End-2-End QoS Provisioning in UMTS networks

End-2-End QoS Provisioning in UMTS networks End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1

More information

PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch.

PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch. As we enter the 21st century, we are experiencing a telecommunications revolution. From a technological perspective, the distinction between voice information and other kinds of data is blurring as circuit-switched

More information

TAXONOMY OF TELECOM TERMS

TAXONOMY OF TELECOM TERMS TAXONOMY OF TELECOM TERMS Prepared by TUFF Ltd This short taxonomy is designed to describe the various terms used in today s telecommunications industry. It is not intended to be all embracing but to describe

More information

This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1.

This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1. This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1. WASv61_SIP_overview.ppt Page 1 of 27 This presentation will provide an overview of

More information

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions 1 2005 Nokia city_wlan_2005_haverinen.ppt / 2005-08-19 / HH Outline Key use cases of integrating Wireless

More information

802.11: Mobility Within Same Subnet

802.11: Mobility Within Same Subnet What is Mobility? Spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same AP mobile user, (dis) connecting from using DHCP mobile user, passing through multiple

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

General Guidelines for SIP Trunking Installations

General Guidelines for SIP Trunking Installations General Guidelines for SIP Trunking Installations 1) How do I setup my SIP trunk for inbound/outbound calling? We authenticate IP-PBX SIP Trunking traffic by: IP Authentication (IP address) or Digest Authentication

More information

Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: [email protected] TEL: 03-9357400 # 340

Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: wechen@niu.edu.tw TEL: 03-9357400 # 340 Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: [email protected] TEL: 03-9357400 # 340 Outline Session Initiation Protocol SIP Extensions SIP Operation

More information

Service Identifier Comparison module Service Rule Comparison module Favourite Application Server Reinvocation Management module

Service Identifier Comparison module Service Rule Comparison module Favourite Application Server Reinvocation Management module Service Broker for Managing Feature Interactions in IP Multimedia Subsystem Anahita Gouya, Noël Crespi {anahita.gouya, noel.crespi @int-evry.fr}, Institut National des télécommunications (GET-INT) Mobile

More information

Whitepaper: Microsoft Office Communications Server 2007 R2 and Cisco Unified Communications Manager Integration Options

Whitepaper: Microsoft Office Communications Server 2007 R2 and Cisco Unified Communications Manager Integration Options Whitepaper: Microsoft Office Communications Server 2007 R2 and Cisco Unified Communications Manager Integration Options Document Summary This document provides information on several integration scenarios

More information

WHITE PAPER NON-GEOGRAPHIC E-911 SERVICES FOR SIP TRUNKING

WHITE PAPER NON-GEOGRAPHIC E-911 SERVICES FOR SIP TRUNKING WHITE PAPER NON-GEOGRAPHIC E-911 SERVICES FOR SIP TRUNKING NON-GEOGRAPHIC E-911 SERVICES FOR SIP TRUNKING Executive Summary Voice over Internet Protocol (VoIP) is emerging as the new standard for voice

More information

Cisco Emergency Responder 9.0

Cisco Emergency Responder 9.0 Data Sheet Cisco Emergency Responder 9.0 Cisco Unified Communications Solutions unify voice, video, data, and mobile applications on fixed and mobile networks, enabling easy collaboration every time from

More information

Fonality. Optimum Business Trunking and the Fonality Trixbox Pro IP PBX Standard Edition V4.1.2- p13 Configuration Guide

Fonality. Optimum Business Trunking and the Fonality Trixbox Pro IP PBX Standard Edition V4.1.2- p13 Configuration Guide Fonality Optimum Business Trunking and the Fonality Trixbox Pro IP PBX Standard Edition V4.1.2- p13 Configuration Guide Fonality Table of Contents 1. Overview 2. SIP Trunk Adaptor Set-up Instructions 3.

More information

VOICE SERVICES FOR PSTN AND IP NETWORKS

VOICE SERVICES FOR PSTN AND IP NETWORKS VOICE SERVICES FOR PSTN AND IP NETWORKS Qi Guan SIEMENS AG Austria Siemensstra,Pe 88-92, A-I210 Vienna, Austria Key words: Abstract: Voice over IP, VoIP, Services, PSTN This paper presents an architecture

More information

ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers.

ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers. ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers. API: An application programming interface (API) is a source

More information

LifeSize Transit Deployment Guide June 2011

LifeSize Transit Deployment Guide June 2011 LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address

More information

1) How do I setup my SIP trunk for inbound/outbound calling? We authenticate IP-PBX SIP Trunking traffic by:

1) How do I setup my SIP trunk for inbound/outbound calling? We authenticate IP-PBX SIP Trunking traffic by: 1) How do I setup my SIP trunk for inbound/outbound calling? We authenticate IP-PBX SIP Trunking traffic by: IP Authentication (IP address) or Digest Authentication (account and SIP password) After you

More information

Frequently Asked Questions about Integrated Access

Frequently Asked Questions about Integrated Access Frequently Asked Questions about Integrated Access Phone Service How are local, long distance, and international calls defined? Local access transport areas (LATAs) are geographical boundaries set by the

More information

ACCESS TO EMERGENCY CALLS based on VOICE OVER IP

ACCESS TO EMERGENCY CALLS based on VOICE OVER IP Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) ACCESS TO EMERGENCY CALLS based on VOICE OVER IP Vilnius, October 2005 Page

More information

ADTRAN SBC and Avaya IP Office PBX SIP Trunk Interoperability

ADTRAN SBC and Avaya IP Office PBX SIP Trunk Interoperability 6AOSSG001-42B March 2014 Interoperability Guide ADTRAN SBC and Avaya IP Office PBX SIP Trunk Interoperability This guide describes an example configuration used in testing the interoperability of an ADTRAN

More information

White paper. SIP An introduction

White paper. SIP An introduction White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary

More information

Function Description Ascom IP-DECT System

Function Description Ascom IP-DECT System Function Description Contents 1 Introduction... 1 1.1 Abbreviations and Glossary... 1 2 Technical Solution... 2 2.1 System Size... 2 2.2 LDAP Server... 3 2.3 Supported Protocols... 3 2.4 Power the Base

More information

The use of IP networks, namely the LAN and WAN, to carry voice. Voice was originally carried over circuit switched networks

The use of IP networks, namely the LAN and WAN, to carry voice. Voice was originally carried over circuit switched networks Voice over IP Introduction VoIP Voice over IP The use of IP networks, namely the LAN and WAN, to carry voice Voice was originally carried over circuit switched networks PSTN (Public Switch Telephone Network)

More information

Mobile Voice Off-Load

Mobile Voice Off-Load Mobile Voice Off-Load An AdvOSS Solution White Paper Latest version of this white paper can always be found at: http://advoss.com/resources/whitepapers/mobile-voice-offload.pdf For more information, contact

More information