Professional Documents
Culture Documents
It is possible that certain advances in technology will precede these revisions. Therefore, this NENA
TSD should not be the only source of information used. NENA recommends that readers contact
their Telecommunications Carrier representative to ensure compatibility with the 9-1-1 network.
Patents may cover the specifications, techniques, or network interface/system characteristics
disclosed herein. No license expressed or implied is hereby granted. This document shall not be
construed as a suggestion to any manufacturer to modify or change any of its products, nor does this
document represent any commitment by NENA or any affiliate thereof to purchase any product
whether or not it provides the described characteristics.
This document has been prepared solely for the use of E9-1-1 Service System Providers, network
interface and system vendors, participating telephone companies, etc.
By using this document, the user agrees that NENA will have no liability for any consequential,
incidental, special, or punitive damages arising from use of the document.
NENAs Technical Committee has developed this document. Recommendations for change to this
document may be submitted to:
National Emergency Number Association
4350 N Fairfax Dr, Suite 750
Arlington, VA 22203-1695
800-332-3911
or: techdoccomments@nena.org
Page 2 of 247
Page 3 of 247
INTRODUCTION ............................................................................................................................................ 10
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.9
2.10
2.11
2.12
2.13
Page 4 of 247
SECURITY ....................................................................................................................................................... 63
4.1
4.2
4.3
4.4
4.5
4.6
4.7
AUTHENTICATION ............................................................................................................................................... 63
MESSAGE INTEGRITY .......................................................................................................................................... 64
MESSAGE ENCRYPTION....................................................................................................................................... 64
NETWORK ELEMENT SECURITY .......................................................................................................................... 64
NETWORK LAYER SECURITY .............................................................................................................................. 64
APPLICATION LAYER SECURITY ......................................................................................................................... 65
LOCATION DATA SECURITY ................................................................................................................................ 65
Page 5 of 247
Page 6 of 247
Page 7 of 247
Page 8 of 247
Executive Overview
Voice over Internet Protocol (VoIP) is poised to become the predominant technology used in the
telecommunications industry. As the public adopts VoIP, E9-1-1 calls will increasingly originate
from VoIP users. Some VoIP telecommunications service provider networks, however, are not
natively compatible with the existing E9-1-1 infrastructure. This document outlines an architecture
to connect emergency callers in the IP domain with Public Safety Answering Points (PSAPs)
supported by the existing E9-1-1 network infrastructure. This interim step in the migration towards
end-to-end IP networks is referred to as i2.
1.1
This document is the NENA recommended standard for the i2 architecture to support the
interconnection of VoIP domains with the existing Emergency Services Network infrastructure in
support of the migration toward end-to-end emergency calling over the VoIP networks between
callers and PSAPs.
This document provides an overview of the VoIP architecture, functional elements, and interfaces, as
well as the interface specifications necessary for interconnection with the existing Emergency
Services Network infrastructure.
This issue of the i2 standard supports E9-1-1 for fixed and nomadic VoIP services. Support for
mobile VoIP services will be covered in a future release of this document.
This document does not include specifications for the methods used to determine location nor how
the endpoint actually receives location. The document does provide pointers to other specifications
that could be used to provide location to the endpoint.
1.2
Reason to Implement
VoIP is being introduced into the North American environment by VoIP Service Providers (VSPs).
NENA and a number of the VSPs acting through the Voice on the Net (VON) Coalition reached
agreement to support current NENA and industry work towards long-term solutions that include (a)
delivery of 9-1-1 calls to the proper PSAP; (b) providing callback number/contact information to the
PSAP; (c) providing the location of the caller; and (d) PSAPs having direct IP connectivity. The
initial standards development work of the NENA VoIP/Packet Committee was completed by the end
of 2005. The architecture described in this standard reflects that initial work as well as the evolution
of the i2 Solution architecture definition since that time.
This recommended standard is being provided to facilitate the development and implementation of
interoperable, standard equipment and processes to support VoIP emergency services calling
throughout North America.
1.3
Benefits
Page 9 of 247
Ensure that equipment and service providers that conform to these recommendations will
have a solution that is interoperable,
Foster development of network elements and processes that can be reused in the architecture that
supports end-to-end IP calling to the PSAP.
Introduction
2.1
2.2
Additional data provided to the PSAP. In order to differentiate VoIP emergency calling,
VoIP calls will be distinguishable and new data elements pertinent to VoIP calls will be
provided to call takers. This may impact both call taking procedures and training of call
takers.
New processes required. Call routing will be based on the callers location which will be
matched to routing information contained in routing databases. With this architecture, VoIP
caller addresses may not be stored in Automatic Location Identification (ALI) databases, but
must still be Master Street Address Guide (MSAG) valid. This will require comparison with
information contained in new validation databases. New processes to populate and maintain
these routing and validation databases must be developed and implemented.
Default Routing. Some calls will be placed without location information available, making
location-based routing virtually impossible. Some form of default routing for those calls will
have to be implemented. Handling of those calls will have operational implications for the
PSAPs receiving the calls.
Security Impacts Summary
The critical nature of the E9-1-1 Emergency Services Network makes it essential to ensure that the
E9-1-1 network is properly protected. The i2 solution introduces new network elements, new
underlying transport networks and protocols to the E9-1-1 Emergency Services network. Note that a
number of protocol interfaces are outside the scope of the 9-1-1 system (v0/v1) and several are
between elements that are considered to be within the 9-1-1 system (v2, v3, v4, v5, v6, v7, v8, v9
and v-E2). The former are specified by other standards organizations, such as the IETF. The latter
are defined in this document. For the interfaces within the scope of this document, the security
mechanisms are dependent on the specifics of the underlying network joining the various i2 solution
network elements.
2.3
Document Terminology
The terms "shall", "must" and "required" are used throughout this document to indicate required
parameters and to differentiate from those parameters that are recommendations. Recommendations
are identified by the words "desirable" or "preferably".
Page 10 of 247
NENA reserves the right to modify this document. Upon revision, the reason(s) will be provided in
the table below.
Version
Original
2
Approval Date
12/06/2005
8/11/2010
Version 2: This document was originally issued to identify the minimum requirements and desirable
network elements for VSP interconnection with the E9-1-1 Service Provider infrastructure for
delivery of emergency calls and associated callback, location, and service provider information,
equivalent to conventional wireline and wireless callers.
Version 2 of this document is published for the following reasons:
Page 11 of 247
No additional external Standards development work has been identified in support of this Standard.
2.6
Date Compliance
All systems that are associated with the 9-1-1 process shall be designed and engineered to ensure
that no detrimental, or other noticeable impact of any kind, will occur as a result of a date/time
change up to 30 years subsequent to the manufacture of the system. This shall include embedded
application, computer based or any other type application.
To ensure true compliance, the manufacturer shall upon request, provide verifiable test results to an
industry acceptable test plan such as Telcordia GR-2945 or equivalent.
2.7
Anticipated Timeline
This architecture is intended to be implemented in the near term. It provides the technological
approach required to meet the objectives agreed to by NENA and the VON Coalition. Prior to
implementation, further agreement must be reached on roles and responsibilities for developing,
operating and maintaining the network elements called for in the architecture.
2.8
Costs Factors
Implementation of the architecture outlined in this document will require the deployment of a
number of new network elements. Each of the new elements must be provisioned, operated, and
maintained. In addition new databases are required, which will further require the development and
maintenance of new supporting processes.
2.9
In present and future applications of all technologies used for 9-1-1 call and data delivery, it is a
requirement to maintain the same level or improve on the reliability and service characteristics
inherent in present 9-1-1 system design.
New methods or solutions for current and future service needs and options should meet the criteria
below. This inherently requires knowledge of current 9-1-1 system design factors and concepts, in
order to evaluate new proposed methods or solutions against the Path Plan criteria.
Criteria to meet the Definition/Requirement:
1. Reliability/dependability as governed by NENAs technical standards and other generally
accepted base characteristics of E9-1-1 service
2. Service parity for all potential 9-1-1 callers
3. Least complicated system design that results in fewest components to achieve needs
(simplicity, maintainable)
4. Maximum probabilities for call and data delivery with least cost approach
Page 12 of 247
Page 13 of 247
** N)ew
(U)pdate
N
N
Page 14 of 247
Technical Description
This section provides an overview of the i2 migratory solution architecture recommended by NENA
for supporting emergency calls originated in the IP domain and terminated using the Public Switched
Telephone Network (PSTN) emergency services infrastructure.
3.1
General Assumptions
It is assumed that one goal of the i2 solution architecture is to make no changes that will
affect the PSAP.
It is assumed that one goal of the i2 solution architecture is to minimize changes in the
existing providers of 9-1-1 infrastructure (e.g. SR provider, ALI provider, etc.), although
the i2 architecture does not preclude providers of 9-1-1 infrastructure from providing
additional services in the IP domain.
It is assumed that existing processes used for wireless carriers can be used to cause the
Selective Routing Databases (SRDBs) and ALI DBs to be populated with the appropriate
shell records for the Emergency Services Query Keys (ESQKs) used in this architecture.
The i2 solution supports the receipt of both civic and geodetic location information as
input to emergency call routing decisions. This enables the solution to route calls
regardless of the format of the location provided by the source. It is expected that the
location provided by the originating network and chosen for routing purposes by the
VoIP Positioning Center (VPC) will be included in the location information that is
provided to the PSAP. The location provided to the PSAP will be in the same form (civic
or geodetic) that was received by the VPC.
The call setup signaling in the IP domain described in this document uses Session
Initiation Protocol (SIP) as specified in Internet Engineering Task Force (IETF) Request
For Comments (RFC) 3261[5] (plus other supporting work in IETF), and additional
requirements described or identified in this standard. Where IP domains use other
protocols (e.g., ITU-T H.323), it is assumed that they will support emergency parameters
(e.g. location) for inter-working with various interfaces and with SIP when required.
A Valid Emergency Services Authority (VESA) registry will be used to provide
certification of entities that are authorized to query for and view location information for
any given emergency call instance it is requested to process.
The various agencies that are needed to play a role for this solution to work will step up
to their roles and responsibilities.
Location information may, in general, be presented by the VoIP end point by one of two
methods: Civic or geodetic. However, civic location is required for non-wireless fixed
and nomadic types of service, with geodetic location optionally sent as supplemental
information in addition to the civic location for these service types. Civic location
presented to the PSAP is expected to be MSAG Validated.
Page 15 of 247
The ERDB and VDB service must be provided by the same operating entity.
The 9-1-1 authority will determine the single ERDB/VDB provider that will service a
specific geographic area. For example, a State 9-1-1 Authority may choose one provider
for its state or designate separate providers for different regions of the state. This will
ensure that the data in the ERDB and VDB is consistent. See Section 6 for further
discussion.
The Internet architecture provides for, and promotes a model that separates connectivity
and access mechanisms from applications and services. This is in contrast to traditional
telephony and communication networks where access infrastructure is provided by the
service provider as a necessity to service connectivity. This document describes an
interim solution for providing emergency services connectivity to VoIP callers. This
architecture places no requirements on any access network provider having to have a predefined relationship with any application service provider in order to enable emergency
services support.
Although this document focuses on VoIP emergency calls routed via SRs and dedicated
trunks to E9-1-1-enabled PSAPs, this solution also supports the routing of VoIP
emergency calls to non-E9-1-1-enabled PSAPs using a 7x24 (E.164) number to route via
the PSTN. The 7x24 number must be obtained from the PSAP coordinator.
The feature interaction behavior specified in NENA 08-502, NENA E9-1-1 Generic
Requirements, is supported by the i2 Solution.
It is assumed silence suppression will be disabled for emergency calls.
When reusing an ESQK due to ESQK exhaust, there will be no expectation that location
will be provided.
It is expected that a VoIP Endpoint (VEP) operating in an i2 environment is capable of
recognizing an emergency call in order to adapt its behavior specifically for processing
emergency calls. For example, special emergency services logic is required to attach
location, or a reference to it, to an originating emergency call, as well as to adapt feature
interactions and silence suppression behaviors. If the VEP is incapable of recognizing an
emergency call, the fall back is to have the VSP Call Server/Proxy always perform this
task.
It is expected that location, or a reference to it, will be presented with each emergency
call, when available. In special circumstances, it may be possible that explicit userdefined usage rules present in the PIDF-LO document be overridden by regulatory-driven
rules.
For VEPs and VSP Call Servers/Proxies destined for the North American market, it is
expected that, at a minimum, the dialed digits 9-1-1 will be recognized as emergency
dialed digits. The VEP and the VSP Call Server/Proxy may be able to recognize other
well known emergency dialed digits (1-1-2 for the EU, 9-9-9 for the UK, etc.).
Page 16 of 247
This section provides an overview of the interconnection between the IP domains and the existing
E9-1-1 Emergency Services Provider infrastructure.
Figure 3-1 illustrates the functional elements and signaling interfaces used to support the i2 solution.
The acronyms used to label elements in the diagram are defined in the NENA Master Glossary and
in Section 2.13 of this standard. On the left of the figure are the functional elements of the IP
domain. Some of these represent functional elements used in the SIP architecture and are defined in
IETF RFC 3261[5].
Several new functions are introduced in the i2 solution that assist in:
Page 17 of 247
Emergency Services
Provider Network
IP domain
PSTN
Routing Proxy &
Redirect Server(s)
PSTN
Gateway
v6
Call Server/
Proxy
ESGW(s)
v5
v4
E9-1-1
Selective
Router(s)
v4
v1
PSAP
v2
VoIP
End
Point
v2
v0
VPC
VPC
VPC
v3
SRDB
v-E2
v8
LIS
ERDB
v9
v7
v9
ALI
VDB
DBMS
MSAG
RDS
Figure 3-1 VoIP Domain Interconnection with Emergency Services Provider Network
This figure is simplified for illustrative purposes, not showing all the interconnection of multiple
entities or mirrored E9-1-1 Selective Routers (SRs), ALI DBs, or new MSAG-based databases used
for VoIP emergency call routing or validation of location. The PSTN cloud is part of the diagram
because the i2 solution allows for the routing of VoIP emergency calls to non-E9-1-1-enabled
PSAPs using E.164 numbers [53] and contingency routing using the PSTN. In cases of failures, it
may be possible for emergency calls to be routed to the appropriate PSAP using the PSTN. It should
be noted that:
There may be multiple VoIP Positioning Centers (VPCs) in any given serving area. The Call
Server/Proxy Server/Redirect Server hosting the v2 interface chooses the VPC for
interconnection.
Page 18 of 247
A given VPC may have interfaces to one or more ALI DBs. One or more VPCs may have
interfaces to any given ALI DB.
The Emergency Service Zone (ESZ) Routing Database (ERDB) may be distributed across
multiple database repositories in North America, but there is one authoritative source for the
routing data for any given geographic serving area. When the ERDB is implemented apart
from the VPC, it may support routing queries from VESA-certified VPCs in the i2 solution.
The Validation Database (VDB) may be distributed across multiple database repositories in
North America, but there is one authoritative source for the location validation data for any
given geographic serving area.
There will be at least one Emergency Services Gateway (ESGW) interconnected with any
given E9-1-1 SR.
Any given ESGW may be interconnected with one or more E9-1-1 SRs.
At any given time, each VoIP endpoint (VEP)/User Agent (UA) will interact with only one
Location Information Server (LIS) yielding a single unambiguous location or location
reference.
A Call Server (CS) is operated by a VSP. A CS is typically configured to contact contracted
VPC(s) for emergency calls or alternatively, can contract a Redirect Server or Routing Proxy
for this task.
ESGW operators can be regional, similar to SR operators today.
Each VSP operator may contract with one or multiple ESGW operators and a single ESGW
can be reached from multiple VSP operators.
The interfaces shown in Figure 3-1 are described in greater detail in subsequent sections of this
document.
3.3
This section provides brief high-level descriptions of the functional elements in the IP domain used
to support validation and management of location information, routing of emergency calls, and
delivery of location-related information to network elements and databases in the existing E9-1-1
service provider infrastructure.
3.3.1
As defined for SIP in IETF RFC 3261[5], the User Agent represents an endpoint in the IP domain, a
logical entity that can act as both a user agent client (UAC) that sends requests, and as user agent
server (UAS) responding to requests.
3.3.2
In this document, the term VoIP endpoint is used to refer to the endpoint IP device that is used to
originate an emergency call. It can take the form of a VoIP phone device, a VoIP Analog Terminal
Adaptor (ATA) or a VoIP soft-client application running over a Personal Computer (PC).
Page 19 of 247
Server
A server is a network element that receives requests in order to service them and sends back
responses to those requests. Examples of servers used in SIP domains are proxies, user agent servers,
redirect servers, and registrars.
3.3.4
Call Server
The term Call Server in this document is used to refer to the entity in a private or public IP domain
that provides service to endpoints in an emergency callers home domain and that interworks with
the SIP servers and other elements in the IP domain used to support emergency services call routing
in the i2 solution. The CS may use SIP or some other VoIP signaling protocol within its own serving
domain.
Functional requirements for the CS in the context of the i2 architecture are described in Section 5.1.
3.3.5
A policy and routing server in the context of SIP is a proxy server, an intermediary entity that acts
as both a server and a client for the purpose of making requests on behalf of other clients. A proxy
server primarily plays the role of routing, which means its job is to ensure that a request is sent to
another entity closer to the targeted user. Proxies are also useful for enforcing policy (for example,
making sure a user is allowed to make a call). A proxy interprets, and, if necessary, rewrites specific
parts of a request message before forwarding it. (Refer to IETF RFC 3261[5].) It can be a
policy/routing element in other protocols.
Functional requirements for the Routing Proxy (RP) in the context of the i2 architecture are
described in Section 5.2.
3.3.6
In the context of SIP, a call relay server is a redirect server that generates (3xx) redirect responses to
requests it receives, redirecting the client to contact an alternate set of Uniform Resource Identifiers
(URIs). (Refer to IETF RFC 3261[5].) This may be an H.323 Gatekeeper for implementations that
use ITU-T H.323 architectures [29].
Functional requirements for the Redirect Server in the context of the i2 architecture are described in
Section 5.3.
3.3.7
The ESGW is the signaling and media inter working point between the IP domain and conventional
trunks to the E9-1-1 SR. It uses either Multi-Frequency (MF) or Signaling System #7 (SS7)
signaling. The ESGW uses the routing information provided in the received call setup signaling (the
ESGWRI) to select the appropriate trunk (group) and proceeds to signal call setup toward the SR
including the ESQK in outgoing signaling. The ESGW may signal only the 10-digit ESQK or, both
the ESQK and callback number to the SR.
Version 2, August 11, 2010
Page 20 of 247
The ERDB contains the routing information associated with ESZs. It supports the boundary
definitions for ESZs and the mapping of civic address or geo-spatial coordinate location information
to a particular ESZ.
For each ESZ, the ERDB contains an Emergency Route Tuple (ERT) consisting of a Selective
Routing Identifier, a routing Emergency Services Number (ESN) that uniquely identifies the ESZ in
the context of that SR, and an NPA that is associated with the outgoing route to the SR. The ERDB
may contain a Contingency Routing Number (CRN) (i.e., a 10-digit 24x7 PSAP number) associated
with the ESZ. The ERDB may also contain an Administrative ESN for the ESZ, when applicable.
Section 5.5.1 provides more details on Administrative ESNs. There is a one-to-many relationship
between an ERT and ESZs.
When an emergency call is originated and location information is received from the VPC, the ERDB
will identify the ESZ and routing information associated with the location information. It will return
the ERT, CRN (if available) and optionally, the administrative ESN to the VPC.
The ERDB supports an interface from one or more VESA-certified VPCs in the i2 solution. The
ERDB may be distributed across multiple database repositories, but there is one authoritative source
for the routing data for any given geographic serving area. Civic location-based routing data in the
ERDB is expected to be based on the same MSAG data used to provide location validation in the
VDB, and also from existing SR network configuration information. The ERDB may support an
interface to the Database Management Systems that manage the MSAG data (to receive updates),
but this interface is not specified in this document.
Functional requirements for the ERDB in the context of the i2 architecture are described in Section
5.5.
3.3.9
The VPC is the element that provides routing information to support the routing of VoIP emergency
calls. It also cooperates in delivering location information to the PSAP using the existing ALI DB
infrastructure.
The VPC interfaces to the ERDB to obtain routing data.
The VPC receives queries from the CS or RP/RS over the v2 interface.
The information provided in a query over the v2 interface includes callback and subscriber name
information, when available (to be provided to the PSAP so that a call taker can call back an
emergency caller), and a Presence Information Data Format-Location Object (PIDF-LO) [8][37] or
Location Key. The VPC may also receive other information about the call, such as VSP
identification information.
Version 2, August 11, 2010
Page 21 of 247
Page 22 of 247
This section identifies 9-1-1 data objects defined in the i2 solution architecture. These data objects
are needed to support routing of emergency calls and delivery of location information to PSAPs. The
use of the data objects and the protocols defined to carry them are described in detail in the
specification of the various interfaces in the i2 solution architecture.
Page 23 of 247
a 3- to 5-digit routing Emergency Services Number (ESN) that uniquely identifies the ESZ in
the context of that SR,
an NPA that is associated with the outgoing route to the SR.
Emergency Services Query Key (ESQK) The ESQK identifies a call instance at a VPC, and is
associated with a particular SR/ESN combination. The ESQK is delivered to the E9-1-1 SR and may
be delivered as the calling number/ANI for the call to the PSAP. The ESQK is used by the SR as the
key to the Selective Routing data associated with the call. The ESQK may be delivered by the SR to
the PSAP as the calling number/ANI for the call, and subsequently used by the PSAP to request ALI
information for the call. The ALI database includes the ESQK in location requests sent to the VPC.
The ESQK is used by the VPC as a key to look up the location object and other call information
associated with an emergency call instance. The ESQK is expected to be a ten-digit North American
Numbering Plan (NANP) Number.
Last Routing Option (LRO) The LRO is sent by the VPC to the Call Server/Routing Proxy and
provides the Call Server/Routing Proxy with a "last chance" destination for the call. The LRO may
be the Contingency Routing Number (CRN), which is a 24x7 PSAP emergency number, or it may
contain a routing number associated with a national or default call center. The content of the LRO
will depend on the condition that resulted in the providing of the LRO. Ultimately the usage of LRO
routing data for call delivery is based on logic internal to the Call Server/Routing Proxy.
Contingency Routing Number (CRN) A 10-digit 24x7 number that could be used, when
available, to route emergency calls to the PSAP in scenarios where a network (i.e., trunk or SR)
failure results in the ESGW being unable to route the emergency call over the desired path to the SR.
The CRN is expected to be a 10-digit NANP number.
Page 24 of 247
HouseNum
PrefixDirectional (not included in all addresses e.g. N 7TH)
StreetName
StreetSuffix (not included in all addresses e.g. CONGRESS AVE)
PostDirectional (not included in all addresses e.g. ACADEMY DR E)
PostalCommunity
CountyName
StateProvince
PostalCode
Country
1 The i2 solutions uses Internet standards for location representation as described in RFC-5491[18]. Locations expressed
as points and shapes are specified using the WGS-84 datum in either 2 or 3 dimensions.
Page 25 of 247
HouseNum
HouseNumSuffix
PrefixDirectional (not included in all addresses e.g. N 7TH)
StreetName
StreetSuffix (not included in all addresses e.g. CONGRESS AVE)
PostDirectional (not included in all addresses e.g. ACADEMY DR E)
MSAGCommunity
CountyID (not used by all MSAG addresses)
StateProvince
An address is considered MSAG valid if it exists in the MSAG database. The MSAG database is
created by the Addressing Authority for a region. It contains entries for valid Address Ranges for the
Streets (within the Communities, Counties, and State/Province) for which the Addressing Authority
is responsible. The Abbreviations, Street Names and Community Names may not be the same as the
valid Postal Address for the same address (in fact they will most probably be different see
Appendix C). An MSAG address may also require a County ID to be specified. The County ID may
be an abbreviation of the County Name or it may be the Tax Area Rate (TAR) Code for the County.
3.5
Interface Definitions
This section provides brief definitions of the VoIP and data exchange interfaces included in the i2
Solution.
The v2, v7, v8 and v9 interfaces specifications are based on web services. A short tutorial on this
technology is provided in Exibhit 8.5 for convenience.
3.5.1
The v0 interface is used to provide a means for a VoIP endpoint to receive information
corresponding to a pre-determined location. The information provided may be in the form of a LK,
or it can be a PIDF-LO containing the actual location, as described in Section 3.5.2. In the i2
timeframe, it is expected that the PIDF-LO may include either or both Geodetic and Civic
information, to enable routing of the emergency call, and a Civic Location, e.g. addresses for nonmobile IP devices (mobile IP endpoints are not specifically addressed), for display to the PSAP.
How the IP network actually determines the location and the protocol between the LIS and IP device
is outside the scope of this document.
Version 2, August 11, 2010
Page 26 of 247
The v1 interface is between the VoIP Endpoint and the Call Server within the VSPs network. It is
used to initiate an emergency call which will ultimately be answered by the correct PSAP and is also
used to communicate the location information to the Call Server when an emergency call is initiated.
The interfaces must:
a. Transport emergency call notifications
b. Support transport of the location information (containing either or both of a PIDF-LO and
LK)
c. Support the other requirements listed in this document.
This interface should be defined by standards organizations such as TIA/IETF. Additional details
can be found in Section 6.2.
3.5.3
The v2 interface is used to request emergency call routing information. The Call Server can invoke
the v2 interface directly or utilize a Routing Proxy/Redirect Server, which requires forwarding the
LIE, or sufficient information to construct the LIE to the Routing Proxy/Redirect Server. It is
expected that the VSP/Routing Proxy Operator will have a business relationship in place which
would allow the Call Server/Proxy to send requests for routing information to the appropriate VPC.
The v2 interface is an eXtensible Markup Language (XML) query/response interface. It provides a
means for the Call Server/Routing Proxy/Redirect Server to request emergency services routing
information from the VPC based on the location of the caller. The Call Server/Routing
Proxy/Redirect Server sends a request containing location information (LO or LK), subscriber name
and callback information, and if available, a VSP identifier to the VPC. The VPC uses the location
information to interact with an ERDB to determine an ERT for routing. The ERT is also used to
determine a pool of ESQKs from which an ESQK can be allocated for the call. The ERT and ESQK
are returned over the v2 interface in the response to a request for routing information associated with
an emergency call. As an alternative to the v2 interface returning the ERT, the VPC may translate
the ERT into an ESGWRI which is returned instead of the ERT. The VPC will return an LRO, if
one is available. Additional details can be found in Section 6.3.
3.5.4
v3 VPC to LIS
The v3 interface provides a means for the VPC to obtain the emergency callers location. This is
used when the LIE, provided to the VPC via the v2 interface, contains an LK. The LK is used in
obtaining the location from the LIS. The VPC uses the returned location information to obtain
routing information from the ERDB. Additional details can be found in Section 6.4.
Page 27 of 247
The v4 interface is used to forward the call to the appropriate ESGW. The Call Server/Routing
Proxy uses the ESGWRI returned from the VPC, or derived based on the ERT returned by the VPC,
to forward calls to the appropriate ESGW, and inserts the ESGWRI and ESQK into the signaling
message. Additional details can be found in Section 6.5.
3.5.6
The v5 interface is defined as a SIP interface to a Redirect Server so it supports a subset of the SIP
specification. The Call Server sends a SIP INVITE containing callback information, the subscriber
name, the LO and/or LK, and the VSP identifier to the Redirect Server. The Redirect Server
interfaces to the VPC over v2 to obtain routing instructions for the emergency call based on the
location of the caller. The VPC provides the Selective Routing Identifier, Routing ESN and NPA
(referred to as an ERT) or ESGWRI along with the ESQK to the Redirect Server. The Redirect
Server responds to the Call Server with a 300 response with a Contact header containing the
ERT/ESGWRI and a P-Asserted-Identity (PAI) [40] containing the ESQK. The Redirect Server will
also include a Contact header including the LRO, if a LRO was included in the response from the
VPC. The Call Server then selects an ESGW based on the ERT/ESGWRI and forwards the call to it
via the v4 interface.
To facilitate release of the ESQK allocated to the call, the Redirect Server will need to inform the
VPC when the call has terminated. To enable termination reporting using existing SIP methods, the
Redirect Server will need to send a SUBSCRIBE method to the Call Server via the v5 interface to
make the Call Server aware that notification should be sent upon termination of the call. When the
Call Server detects that the call has terminated, the Call Server will send a SIP NOTIFY method via
the v5 interface to the Redirect Server. Upon receiving the NOTIFY method, the Redirect Server
will inform the VPC over the v2 interface so that it can release the ESQK.
Additional details can be found in Section 6.6.
3.5.7
The v6 interface is defined as a SIP interface to a Routing Proxy. The Routing Proxy supports the
full SIP specification. The CS sends a SIP INVITE containing the callback information, the
subscriber name, the LO and/or LK, and the VSP identifier to the RP. This interface is used when
the CS (unconditionally) routes all emergency calls to a Routing Proxy.
Additional details can be found in Section 6.7.
3.5.8
v7 LIS to VDB
The v7 interface is used by the LIS provider to request validation of a given Civic Location as
compared with the MSAG-based data stored in the VDB. The VSP may also use this interface from
its LIS, when acting on behalf of its customers in the function of location provider/verifier.
Page 28 of 247
v8 VPC to ERDB
The v8 interface supports queries from the VPC to the ERDB. The VPC sends location information
for the emergency caller to the ERDB to obtain routing information (ERT), and other information to
help in selection of an appropriate ESQK for the call and to support the delivery of call/location
information in response to ALI database requests.
Additional details on this interface can be found in Section 6.9.
3.5.10 v9 LIS/VPC to Root Discovery Operator
The v9 interface allows a LIS/VPC to discover the appropriate VDB/ERDB. Several mechanisms
have been defined to allow for the discovery of the VDB/ERDB and these mechanisms are described
in Section 3.9.
Additional details on this interface can be found in Section 6.10.
3.5.11 v-E2 VPC to ALI DB
The v-E2 interface uses the E2+ protocol as defined in NENA Standards 05-001[13], with
modifications required for support of i2. The ESQK is sent in a query by the ALI DB over the v-E2
interface. The VPC responds with the emergency callers location, callback number, and VoIP
Provider identifier/information it received in the VSP and/or source element.
The ALI DB will need to steer ESQK queries to the VPC provider. The ESQK may need to be
identified with a VoIP Class of Service to separate this processing from the logic that is in place for
Wireless.
Additional details on this interface can be found in Section 6.11
3.6
There may be a variety of technologies and solutions for determining the location of an individual
caller, but after the location has been determined and validated (refer to Section 3.8), location
information must be made available for routing an emergency call to the appropriate interconnection
point and for delivery to the PSAP. This section provides a high-level overview of two basic
scenarios for storing and conveying location information for support of emergency calling from the
IP domain.
Page 29 of 247
To convey geographical location information within an object that includes a user's privacy and
disclosure preferences and which is protected by strong cryptographic security, the IETF has defined
an XML-based Presence Information Data Format - Location Object (PIDF-LO) that allows for
encapsulation of location information within a presence document. The PIDF-LO defines an object
suitable for both identifying and encapsulating pre-existing location information formats and for
providing adequate security and policy controls to regulate the distribution of that location
information. To provide its location to another entity (e.g., for originating an emergency call among
many other potential applications), the VoIP endpoint constructs a PIDF-LO that encapsulates its
location, as well as policy documents that describe how and to what entities that location information
can be presented. Note that the emergency services architecture being developed in IETF allows the
UA Client to include location information on emergency calls. The PIDF-LO can be used
independently of any 'using protocol' (e.g., SIP); any protocol that can carry XML or MIME
document types can carry the PIDF-LO.
In the endpoint-stored location scenario, using SIP signaling, the UA includes this PIDF-LO in the
message body of the INVITE message over the v1 interface shown in Figure 3-1. The PIDF-LO may
be carried over the v5 or v6 interface to a redirect or routing proxy, depending on the call routing
scenario (refer to Section 3.6), and is carried in a LIE over the v2 interface to the VPC for routing
determination and for subsequent delivery to the PSAP. The IETF draft-ietf-sipcore-locationconveyance [12] describes location conveyance.
3.6.2
An alternate approach to supporting location for emergency services calling is allowed in the i2
solution, where completely specified in other standards bodies 2. This method allows for the LIS to
store the location information for a given endpoint and to download to that VoIP endpoint a Location
Key, in addition to, or instead of, the location information itself. Then, the VoIP endpoint stores the
LK and provides it, instead of or in addition to the location information, over the v1 interface on
emergency call originations. The location information/Location Key may be carried in call setup
signaling over the v5 or v6 interface to a redirect or routing proxy, depending on the call routing
scenario (refer to Section 3.6), and it will be included over the v2 interface to the VPC. When the
VPC receives the LK in an LIE, it uses the LK to query the appropriate LIS over the v3 interface.
The LIS returns the PIDF-LO to the VPC for routing determination and for subsequent delivery to
the PSAP.
3.7
The definition of Call Server, Redirect Server, and Routing Proxy permits a variety of business
relationships and responsibilities to be established. The variations considered in this document
include (but are not limited to):
2 The IETF has work started to define the Location Key (known as location-by-reference, LbyR) mechanism. At this time, the
working group is discussing the requirements in [43]. Location Conveyance is described in [12].
Page 30 of 247
The VSP contracts for VPC and ESGW services from one or more providers, and retains
maximum control over the processing of emergency calls. The VSPs Call Server
implements the v2 interface, directly queries the VPC for routing information (i.e., ESQK,
LRO, and either the ERT or ESGWRI), selects the proper ESGW based on the ESGWRI, and
routes calls via the PSTN using the LRO if normal routing fails.
The VSP contracts separately for VPC and ESGW services but desires a SIP interface to
access routing data. The Redirect Server Operator implements a Redirect Server which
accepts 9-1-1 calls from the VSPs Call Server. The Redirect Server obtains the routing
information from the VPC. It returns the call to the VSPs Call Server with the ERT or
ESGWRI in the SIP Contact Header, and the ESQK in the SIP P-Asserted Identity header.
The Call Server selects the proper ESGW based on the ESGWRI. The Call Server handles
alternate routing using the LRO.
The VSP contracts for a single 9-1-1 call termination service from a Routing Proxy provider
and uses the v6 SIP interface to route emergency calls to the Routing Proxy provider. The
Routing Proxy Service Provider receives all 9-1-1 calls at its Routing Proxy. The Routing
Proxy provider implements the v2 interface, queries the VPC for ESQK, LRO, and either
ERT or ESGWRI, selects the proper ESGW based on the ESGWRI, and routes calls via the
PSTN using the LRO if normal routing fails.
The remainder of this section describes these three different example call routing scenarios which
will be able to be supported in the i2 solution. These solutions differ in terms of the element that is
responsible for interacting with the VPC to obtain the routing information and the query key for the
call, and in subsequently routing the call to the appropriate gateway (i.e., ESGW). In the first
scenario, it is assumed that a Call Server is responsible for detecting that an emergency call
origination has been requested, and interacting with a VPC to obtain the necessary routing
information and query key. The Call Server is then responsible for routing the call to the appropriate
ESGW. The second scenario includes a Redirect Proxy, which is responsible for accessing the VPC,
but subsequently returns control of the call back to the Call Server for subsequent
routing/processing. In the third scenario, a Routing Proxy Server in the call path is responsible for
querying the VPC and routing the call forward to the ESGW. Each of these scenarios is illustrated
with a diagram showing the relevant interfaces and a high-level description of the associated
information flow.
These scenarios also describe a contingency routing capability, to address scenarios in which the
ESGW is unable to route an emergency call to the E9-1-1 SR over the desired path because of a
failure condition associated with the interconnecting trunk group or SR.
Each scenario also includes delivery of an indication of call release to the VPC so that it can release
the allocated ESQK for use in routing other calls.
Performance in call routing is important so that VoIP-originated emergency calls reach the
appropriate PSAP as quickly as possible. This document does not provide normative requirements
on call routing performance however, informative guidelines are available in Section 9.7 to help
implementers in designing the best approach end-to-end.
Version 2, August 11, 2010
Page 31 of 247
Figure 3-2 illustrates a basic call routing scenario for a VoIP emergency call origination. In this
scenario, a Call Server queries the VPC for routing information, and routes the call directly to the
ESGW. Before the emergency call is originated, the civic location is validated in steps A and B
(refer to Section 3.8).
IP domain
Call Server/
Proxy
2. INVITE
(911@VSPdomain
{PIDF-LO} / {LK})
Emergency Services
Provider Network
7. INVITE
(ESGWRI, ESQK,
[Callback])
CAMA or SS7
v4
8. Call route
(ESQK, [Callback])
3. Query (Callback,
Customer, LIE)
6. Response (ERT or
ESGWRI, ESQK, [LRO])
v1
User
Agent
E9-1-1
Selective
Router
ESGW
VPC
v0
v3
LIS
4. Query (LK)
5. Response
(PIDF-LO)
v8
ERDB
MSAG
MSAG
MSAG
v7
A. Validation query (civic location)
B. Validation response (valid or
error [with diagnostic])
NENA
02-010
ALI
v-E2
1. LO
and/or
LK
9. Deliver
Call (ESQK,
[Callback])
SRDB
v2
PSAP
MF, E-MF,
ISDN, CTX
VDB
DBMS
Step 1. The endpoint is populated with a LO and/or LK. The figure illustrates the method whereby a
PIDF-LO/LK is downloaded from the LIS to the endpoint using the v0 interface.
Step 2. The VoIP endpoint originates an emergency call by sending a call initiation request,
designating 911@VSPdomain 3 as the target destination, and including the LO and/or LK. Using SIP
as the example, the User Agent would send an INVITE, including sip:911@VSPdomain in the
Request URI header, the Address of Record (AoR) associated with the User Agent (possibly in the
form of a tel- uri[41]) in the From header, and including the PIDF-LO member-body in the INVITE.
3 RFC 5031 [24]defines a URN scheme that could be used in the context of emergency services. It would replace the actual country-
specific dial string typically found in the user part of the URI of the INVITE. Please refer to [24] for a description of this mechanism.
Page 32 of 247
A callback number associated with the emergency caller in the form of an E.164 telephony
number (e.g., a tel URI)
A subscriber name associated with the emergency caller
A LIE.
Step 4. If a LK is received, the VPC queries the identified LIS over the v3 interface, including the
LK.
Step 5. The LIS returns to the VPC the requested location over the v3 interface.
Step 6. The VPC uses the location (received from the Call Server or queried from the LIS) to obtain
the ESZ-related routing information from the ERDB over v8 (not shown). The ERDB identifies the
ERT and CRN that will facilitate routing via the appropriate ESGW to the SR that serves this ESZ.
The VPC uses the received routing information to allocate an available ESQK from the pool of
ESQKs appropriate for the SR/ESN associated with the callers location/ESZ and sends a response
to the routing request for this call. The routing response sent to the Call Server will contain the
allocated ESQK and the appropriate LRO. In addition, routing information will be included in the
response that consists of either the ERT (if the Call Server is responsible for performing the ERT-toESGWRI translation), or an ESGWRI (if the VPC is responsible for performing the ERT-toESGWRI translation.
The VPC also determines the VSP either from the routing request contents or from the originator of
the request. The VPC maps the callers Callback number, subscriber name, VSP, and the contents of
the location into the appropriate fields necessary to populate the response to an Emergency Services
Positioning Request (ESPOSREQ) and stores this information pending a subsequent query from the
ALI DB.
Step 7. If the Call Server receives an ERT in the routing response from the VPC, the Call Server
will use the ERT to determine the target ESGW and the appropriate ESGWRI value for the call. If
the Call Server receives an ESGWRI in the routing response from the VPC, the Call Server will take
the ESGWRI received in the response and use it as the basis for selecting the appropriate ESGW
toward which to route the emergency call. In either case, the Call Server routes the call to the
ESGW, including the ESGWRI, the ESQK, and the callback number in outgoing signaling.
The LRO will be retained at the Call Server and only used for emergency call routing if the ESGW
detects a failure condition that makes routing based on the ESGWRI impossible.
Step 8. The ESGW uses the received ESGWRI to select an outgoing route (i.e., trunk group) to the
appropriate E9-1-1 SR. If the trunk group is available, the ESGW seizes a trunk and signals an
Page 33 of 247
Figure 3-3 illustrates an example of an emergency call setup using SIP signaling to a Redirect
Server. In this scenario, the Call Server uses a Redirect Server to obtain routing information, and
then routes the call to the ESGW. The SIP Redirect Server performs a routing query to the VPC
over the v2 interface.
Before the emergency call is originated, the location is validated in steps A and B (refer to Section
3.8).
Steps 1 and 2 are the same as in the basic scenario described in Section 3.6.1.
Page 34 of 247
A callback number associated with the emergency caller in the form of an E.164 telephony
number (e.g., a tel URI)
A subscriber name associated with the emergency caller
LIE.
Emergency Services
Provider Network
IP domain
Call Server/
Proxy
9. INVITE
(ESGWRI, ESQK, [Callback])
ESGW
E9-1-1
Selective
Router
CAMA or SS7
v4
3. INVITE
8. REDIRECT
2. INVITE
(911@VSPdomain
{PIDF-LO} / {LK})
v5
Redirect
Server
v1
User
Agent
v2
4. Query (Callback,
Customer, LIE)
7. Response (ERT or
ESGWRI, ESQK,
[LRO])
LIS
5. Query (LK)
6. Response
(PIDF-LO)
ERDB
v7
VDB
A. Validation query (civic location)
B. Validation response (valid or
error [with diagnostic])
11. Deliver
Call (ESQK,
[Callback])
ALI
v-E2
13. ESPOSREQ (ESQK)
14. esposreq (Callback,
Customer, location,
[provider info])
v8
v3
PSAP
NENA
02-010
VPC
v0
1. LO
and/or
LK
SRDB
MF, E-MF,
ISDN, CTX
DBMS
MSAG
MSAG
MSAG
Steps 5 through 7 are the same as Steps 4 through 6 in the basic scenario described in Section 3.6.1.
Step 8. The Redirect Server returns a SIP REDIRECT message to the SIP Proxy, including the
ESQK and either the ERT or the ESGWRI provided by the VPC. It may also include a LRO, if
provided by the VPC.
Page 35 of 247
Figure 3-4 illustrates an example of emergency call routing via a routing proxy. In this scenario, the
emergency call is routed via a routing proxy which initiates the routing query to the VPC, and then
routes the call directly on to the appropriate ESGW.
Emergency Services
Provider Network
IP domain
Call Server/
Proxy
3. INVITE
(Callback, Customer,
{PIDF-LO} / {LK})
v6
Routing
Proxy
v1
8. INVITE
(ESGWRI,ESQK,
[Callback])
ESGW
CAMA or SS7
9. Call route
(ESQK, [Callback])
User
Agent
v2
SRDB
LIS
v3
5. Query (LK)
6. Response
(PIDF-LO)
v8
10. Deliver
Call (ESQK,
[Callback])
NENA
02-010
ALI
v-E2
VPC
v0
1. LO
and/or
LK
PSAP
ISDN, CTX
v4
2. INVITE
(911@VSPdomain
{PIDF-LO} / {LK})
E9-1-1
Selective
Router MF, E-MF,
ERDB
MSAG
MSAG
MSAG
v7
A. Validation query (civic location)
B. Validation response (valid or
error [with diagnostic])
VDB
DBMS
Before the emergency call is originated, the LO is validated in steps A and B (refer to Section 3.8).
Steps 1 and 2 are the same as in the basic scenario described in Section 3.6.1.
Step 3. The Call Server/SIP proxy sends an INVITE over the v6 interface to a SIP Routing Proxy.
The INVITE includes the callback number, subscriber name, and PIDF-LO.
Step 4. The SIP Routing Proxy queries the VPC over the v2 interface, including the following
information:
Page 36 of 247
A callback number associated with the emergency caller in the form of an E.164 telephony
number (e.g., a tel URI)
A subscriber name associated with the emergency caller
LIE.
Steps 5 and 6 are the same as Steps 4 and 5 in the basic scenario described in Section 3.6.1.
Step 7. The VPC uses the received PIDF-LO to request routing information from the ERDB over v8
(not shown). The ERDB uses the received location to determine the ERT and CRN for the call. The
VPC uses the ERT to determine the ESQK associated with the ESZ of the caller, and allocates an
available ESQK for the call. The VPC sends a response to the routing request for this call over the
v2 interface to the Routing Proxy, including the allocated ESQK and either an ERT (if the Routing
Proxy is responsible for performing the ERT-to-ESGWRI translation) or an ESGWRI (if the VPC is
responsible for performing the ERT-to-ESGWRI translation). An LRO is also expected to be
included in the routing response.
The VPC also determines the VSP either from the routing request contents or from the originator of
the request. The VPC maps the callers callback number, subscriber name, VSP, and the contents of
the location into the appropriate fields necessary to populate the response to a subsequent
ESPOSREQ from the ALI DB and stores this information pending a subsequent query.
Step 8. The SIP Routing Proxy routes the call to the ESGW over the v4 interface, including the
ESQK provided by the VPC, the ESGWRI determined by the Routing Proxy or provided by the
VPC, and the callback number.
Steps 9-15 in the Emergency Services Provider Network are the same as Steps 8-14 in the basic
routing scenario described in Section 3.6.1.
3.7.4
To route calls to the correct ESGW, the routing entity must translate an ESGWRI to the URI of the
ESGW. One way this can be accomplished is by having the ESGW operator maintain a table that
maps an ESGWRI value to an ESGW. The routing data for this table can be provided in a
standardized form, and may be retrieved using HTTP [33]. An example of a table, expressed as an
XML representation is as follows:
Page 37 of 247
<route-table xmlns="urn:nena:xml:ns:es:rt"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="urn:nena:xml:ns:es:rt rt.xsd">
<ESGW>
<organizationName>Generic ESGW Service</organizationName>
<expiration>2006-12-01 09:28:43+10:00</expiration>
</ESGW>
<Routes>
<Route ESGWRI=2127113345 hostId=LowerManttanNY.example.com/>
<Route ESGWRI=2127113346 hostId=LowerManttanNY.example.com/>
...
<Route ESGWRI=4047113345 hostId=RaritanNJ.example.com/>
...
</Routes>
</route-table>
The exact implementation of the ESGWRI-to-ESGW translation will be determined by the provider
of the routing entity. However, to support this translation function, the ESGW Operator shall supply
the appropriate ESGW URI to the routing entity.
3.8
There are a number of errors or abnormal conditions (e.g., network failures) that may occur in the
process of routing emergency calls originated by VoIP users to the appropriate E9-1-1 SR in the
Emergency Service Providers network. This section identifies different error scenarios that may
occur in the course of routing an emergency call to the appropriate SR in an i2 environment, and
identifies the contingency/default routing mechanisms that should be invoked at the various VoIP
elements that are impacted by the abnormal condition or event.
3.8.1
There are several classes of error/failure conditions that may be detected at the CS. One class of
abnormal conditions is related to the request for routing information that the CS is expected to
generate for emergency calls and send to the appropriate VPC, and the processing of the associated
response message from the VPC. This class of error/failure scenarios includes the following:
The CS cannot identify the VPC (or its network address) to which the routing request
associated with the emergency call should be directed.
The CS has lost connectivity to the VPC.
The CS receives an error response containing no routing information from the VPC.
The CS does not receive any response from the VPC within a pre-determined period of time.
In all of these scenarios, the CS does not receive any routing data from the VPC. If the problem is a
loss of connectivity to the (primary) VPC, and the CS is connected to multiple VPCs, the CS may
attempt to send the routing request to a secondary VPC, provided that the appropriate agreements
exist between the VSP and the VPC providers. Should one of the other error scenarios described
Version 2, August 11, 2010
Page 38 of 247
The CS receives an ESGWRI (along with ESQK and LRO) from the VPC, but there is no
available outgoing route to an ESGW associated with the ESGWRI.
The CS receives a failure indication from the ESGW (as described in Section 3.7.3).
Under both of these scenarios, the Call Server/Proxy is expected to use the LRO received in the
routing response from the VPC, or the default routing number provisioned at the CS, depending on
the precedence pre-defined by the VSP, as the routing number for the call, and the callback number
as the calling number/ANI for the call.
3.8.2
One class of errors that might be detected at the VPC involves problems with the structure or content
of the routing request from the originating node (CS/RP/RS) to the VPC, or queries from the VPC to
the Emergency Service Zone (ESZ) Routing Database (ERDB) or Location Information Server
(LIS). This class includes the following scenarios:
The VPC receives a badly structured routing request (i.e., request message cannot be parsed
or is malformed.)
The routing request contains neither a Location Key nor a PIDF-LO.
Page 39 of 247
The VPC receives a PIDF-LO in the routing request, but it cannot determine, based on the
received location, which ERDB to query for the routing data.
The VPC receives a PIDF-LO in the routing request, but when it uses it to query the ERDB
for routing data, it receives either an error response or no response from the ERDB.
The VPC receives a Location Key in the routing request, but it cannot determine where to
send the location query (i.e., it cannot determine the appropriate LIS).
The VPC receives a Location Key in the routing request, but has lost connectivity to the
desired LIS.
The VPC receives a Location Key in the routing request, and is unable to successfully
retrieve a PIDF-LO from the LIS (i.e., it receives an error response or no response from the
LIS).
In all of these scenarios, the VPC is unable to successfully obtain routing data from the ERDB and
provide it in a response to the originating node. The VPC shall then send a response message that
indicates the nature of the error that occurred. The message may also include a default routing
number (i.e., a 24x7 number associated with a call center), as determined based on prior agreements
between the VPC provider, the VSP, and the call center to which calls are to be default-routed. (The
default routing number will be populated in the Last Routing Option parameter of the response
message.).
If a VPC is responsible for performing the ERT-to-ESGWRI translation, but it is unable to
successfully perform this translation for a specific ERT provided by the ERDB, the VPC will be
expected to send a response message to the Call Server/Proxy that provides default routing
information (consisting of a CRN, if one was returned by the ERDB) in an LRO. It is not
recommended that the ESQK be included in the response to the Call Server since the VPC could not
determine an ESGWRI.
Another type of abnormal condition that might be encountered at the VPC is related to a lack of
resources at the VPC. Specifically, the VPC successfully receives routing data from the ERDB, but
there are no ESQKs available from the applicable pool to associate with the specific call instance. In
this case, the VPC is expected to return a default ESQK value in the response message to the Call
Server/Proxy along with an ERT or ESGWRI and an LRO containing a CRN, if available, or a
default routing number. Since the default ESQK may be used for several concurrent call instances it
may not yield a valid location when used by the ALI to query the VPC over the v-E2. If a VPC
receives an Emergency Services Call Termination (ESCT) message from a Call Server/Proxy that
includes a default ESQK value the VPC shall ignore the ESCT message.
Abnormal conditions associated with the release of ESQKs may also be detected at the VPC. For
example, if the VPC receives an Emergency Services Call Termination (ESCT) message from a Call
Server/Proxy that includes an ESQK value that is not currently assigned (e.g., an ESQK that has
already been released, possibly due to the expiry of the guard timer), the VPC should ignore the
message, log the event and increment the maintenance count.
Page 40 of 247
It is possible that an emergency call gets successfully routed to an ESGW, with the expected
information communicated in call setup signaling (i.e., the ESGWRI , ESQK, and callback number),
and that the ESGW can identify the appropriate outgoing trunk group to the SR associated with the
received ESGWRI, but a trunk failure or SR failure makes it impossible for the ESGW to deliver the
call to the desired SR over the primary route. In such a scenario, it is expected that the ESGW will
attempt to select a secondary route for the emergency call, assuming one has been provisioned.
However, if there is no way for the ESGW to route the call forward, it is expected that the ESGW
will inform the CS of the failure condition using the appropriate SIP signaling mechanism. The CS
will then follow the procedures described in Section 3.7.1.
If, based on provisioning, the ESGW is expected to deliver both a callback number and an ESQK to
the SR over a particular trunk group, and a callback number was not provided to the ESGW in the
received INVITE message, the ESGW shall generate a non-dialable callback number of the form
911-XXX-XXXX, where XXX-XXXX is the last seven digits of the received ESQK. The Class of
Service (CoS) will enable the PSAP to distinguish this non-dialable number from other non-dialable
numbers that are generated for wireless calls (911+7 digits of Electronic Serial Number (ESN)). The
ESGW shall deliver the call to the SR with the non-dialable callback number, and the ESQK.
3.8.4
If the SR receives an emergency call from an ESGW, but the incoming call setup signaling
associated with that call does not include sufficient information to allow the SR to successfully
invoke the selective routing process, the SR will route the call to a pre-defined default PSAP based
on the incoming trunk group over which the call was delivered by the ESGW.
3.8.5
The following table summarizes the contingency/default routing scenarios described above, and the
associated routing procedures.
Table 3-1 Contingency/Default Routing Summary
Element
Call Server/Proxy
Scenario
Procedure
Call Server/Proxy uses predefined default routing
number or URI to route call
to 24x7 call center with
which VSP has an
arrangement. Call
Server/Proxy signals
callback number as calling
Page 41 of 247
VPC
ESGW
Page 43 of 247
Selective Router
3.9
Server/Proxy.
Location Validation
It is important that civic location information be pre-validated by comparison with validation data
based on the MSAG data maintained by the Emergency Services Provider and/or their designated
E9-1-1 Database provider(s).
In the i2 Solution, location validation shall be performed by the LIS provider. The VDB provides a
mechanism to perform validation on civic location information. There is no validation for geodetic
location data.
Location validation must take place before a call is originated. The purpose of location validation is
to ensure that the location information can be used to properly route an emergency call to the desired
PSAP, and also that the location information provided to the PSAP can be used for dispatch of
responders.
The location validation architecture in the i2 Solution supports a mechanism for the entity seeking
validation of civic location information (e.g., the LIS) to discover the appropriate VDB for any given
serving area. This mechanism is described in Section 3.9.1.
After the appropriate VDB has been identified, the location validation request is sent using the v7
interface described in Section 6.9. The location validation request may include as input a postal or
jurisdictional address 4. The end result of location validation shall be location information that is
sufficient to support mapping to a specific record in the MSAG.
4 Jurisdictional Address: An MSAG valid address for the physical location of a subscriber access line, which has been assigned by
the jurisdictions local addressing authority; i.e., planning department, zoning department, etc. and is used for 9-1-1 emergency
dispatching purposes.
Page 44 of 247
Location validation clients (i.e., LISs) to identify the appropriate serving VDB(s) for any
given civic location
VPCs to identify the appropriate serving ERDB(s) for any given civic or geodetic location.
There is no assumption that only one provider of validation services exists for a given
location. There may be competition for validation services in the future and the architecture
shall not preclude the ability for more than one VDB provider to validate a given civic
location. However, if there are competing providers, they must all have validation data that
is based on one authoritative source (the MSAG) designated by the local 9-1-1 jurisdictional
authorities.
A local 9-1-1 authority may certify VDB provider(s) to assure the quality of the data.
Discovery may occur fully automatically, or it may involve manual transcribing of location
information and/or network addresses.
There is no assumption made about whether the service will or will not be available to
members of the general public; this being a matter of individual provider policy and/or any
legislative or other constraints which may emerge in the future.
There is an assumption that a single well-known URL will be available to operate as the root
of discovery for VDB services. There is an assumption that the overall guidelines of
operation and technical information associated with the use of VoIP services to access E9-11 will be publicly available on an Internet accessible web site.
There is no assumption that only one provider of ERDB services may identify itself as the
routing service provider for a given geographic coverage area. This is because the MSAGs
on which the routing data is based may have irregular boundaries that do not conform exactly
to jurisdictional boundaries. In addition where GIS data is used, overlaps of GeoShape
polygon data representing ERDB service coverage areas and the uncertainty associated with
Page 45 of 247
mobile location processes may result in more than one provider being identified for a given
geographic location.
A local 9-1-1 authority may certify ERDB provider(s) to assure the quality of the data.
It is assumed that the ERDB will require authenticated access. It is assumed that discovery
of the ERDBs coverage areas will also require authenticated access.
Discovery may occur fully automatically, or it may involve manual transcribing of location
information and/or network addresses.
It is assumed that the ERDB will generally not be available to members of the general public;
although this may be a matter of individual provider or PSAP policy and/or any legislative or
other constraints which may emerge in the future.
There is an assumption that a single well-known URL will be available to operate as the root
of discovery for ERDB services. This may or may not be the same URL as used for VDB
location validation services. There is an assumption that the overall guidelines of operation
and technical information associated with the use of VoIP services to access E9-1-1 will be
publicly available on an Internet accessible web site.
Page 46 of 247
5 The Root Discover Operator will provide two HTTP based services, a web form and a web service. The former is used manually to
create a query by filling out a form on the RDO web server, and seeing the results presented in human readable form. The latter is
used by a computer system, submitting an XML based query and receiving an XML result.
Page 47 of 247
<v9:identityRequest xmlns:v9="urn:nena:xml:ns:es:v9"
xmlns:alins=http://www.nena9-1-1.org/schemas/2003/ali
xmlns:gml=http://www.opengis.net/gml
xmlns:gs=http://www.opengis.net/pidflo/1.0"
xmlns:xsi=http://www.w3.org/2001/XMLSchema-instance
xsi:schemaLocation="urn:nena:xml:ns:es:v9 v9.xsd">
<v9:civiclocation>
<v9:HouseNum>700</v9:HouseNum>
<v9:PrefixDirectional>N</v9:PrefixDirectional>
<v9:StreetName>LAVACA</v9:StreetName>
<v9:StreetSuffix>ST</v9:StreetSuffix>
<v9:MSAGCommunity>AUSTIN</v9:MSAGCommunity>
<v9:CountyName>TRAVIS</v9:CountyName>
<v9:StateProvince>TX</v9:StateProvince>
<v9:PostalCode>78701</v9:PostalCode>
<v9:Country>US</v9:Country>
</v9:civiclocation>
</v9:identityRequest>
Page 48 of 247
<erdb-identity-request
xmlns=urn:nena:xml:ns:es:erdbdiscover
xmlns:xsi=http://www.w3c.org/2001/XMLSchema-instance
xsi:schemaLocation=urn:nena:xml:ns:es:erdbdiscover erdbdiscover.xsd>
<vlocation>
<geopriv cl:civicAddress coded location>
</vlocation>
</erdb-identity-request>
For identifying the ERDB using geodetic location data, the semantics of the query shall be as
follows:
<v9:identityRequest xmlns:v9="urn:nena:xml:ns:es:v9"
xmlns:alins=http://www.nena9-1-1.org/schemas/2003/ali
xmlns:gml=http://www.opengis.net/gml
xmlns:gs=http://www.opengis.net/pidflo/1.0"
xmlns:xsi=http://www.w3.org/2001/XMLSchema-instance
xsi:schemaLocation="urn:nena:xml:ns:es:v9 v9.xsd">
<gml:Point srsName="urn:ogc:def:crs:EPSG:6.6:4326">
<gml:pos>37.775 -122.4194</gml:pos>
</gml:Point>
</v9:identityRequest>
The responses for both civic and geodetic requests shall be similarly formatted to provide a status of:
Found
NotFound, or
Ambiguous.
For a status of Found, depending on the type of query, the response shall include a list of URLs for
ERDB providers that offer routing determination for that location or a list of VDB providers who
offer validation services for that location. For NotFound, there are no other response parameters
provided. For Ambiguous, those cl:CivicAddress fields which need to be resolved before a definitive
list of providers can be returned shall be provided.
Input is made to the root discovery database containing either civic location, (Postal or MSAG) or
geographic location (lat/long). For a civic location, the query will only operate based on a general
set of input fields, such as community name, county, Zip code, and state. Specific civic location
elements, such as house number and street name will be ignored.
ERDB/VDB queries include both a postal and MSAG community name. For the root discovery
function, if the querier knows BOTH the community names, they will both be matched to determine
Version 2, August 11, 2010
Page 49 of 247
Where <version> is a decimal integer of one or more digits and is greater than or equal to one (1).
The applicable country is a string representing the country of coverage. The strings USA or Canada
shall be used for these countries. For example:
USA
The URL of the source file will be a standard dot delimited URL of the entity which generated the
data file. Nominally this is the VDB root discovery URL. For example:
vdbroot.nena.org
The date and time of creation of the file shall be in the form:
Created <time>
Page 50 of 247
Where YYYY is the four digits representing the year, MM is the zero leading two digits representing
the month, and DD is the zero leading two digits representing the day number of the month. HH is
the zero leading hour of day, from 00 to 23. mm is the zero leading integer minutes of the hour and
SS is the zero leading integer seconds of the minute, both from 00 to 59. Z specifies that the time is
Zulu time.. The date and time of file creation date shall be provided in the universal time coordinated
(UTC) and not be specific to a particular time zone. Since the root reports coverage over multiple
time zones, and the location of the requestor may not match that of the VDB/ERDB operator or the
RDO, a time-zone independent time is required.
The date and time of effect for the file shall be in the form
TakesEffect <time>
The RDO will ensure that TakesEffect <time> will be equal to or less than the Expires <time>.
The effect date and time of the file shall be expressed using the same specification, in UTS, as the
creation date and time. This will be a date and time at which the contents of the file may be regarded
as valid. It shall be no earlier than the creation time and will supersede the contents of any previous
file at that time even if the expiry time of the previous file is after the effect time.
The date and time of expiry for the file shall be in the form
Expires <time>
The expiry date and time of the file shall be expressed using the same specification, in UTS, as the
creation date and time. This will be a date and time no earlier than the effect time. The contents of
the file must be considered invalid at this time and a file with a later effect time than the effect time
of this file must have been retrieved and its contents available to replace the current contents at least
by the time of expiry.
The rest of the file shall consist of the data representing VDB URLs which service indicated
locations. It will be provided as an alphabetically ordered comma separated set of values (CSV) with
each data record commencing on a new line. Each line will have the following format:
<State>, <County>, <Municipality>, <Zip code>, <VDB URL list>
The <State> value will have any one of the standard country specific (e.g.,USPS) 2 character
state/province abbreviations (e.g. CA, WA, TX).
The <County> value will correspond to the country specific (e.g.,USPS) spelling of the county name
(e.g. Collin as in Collin County, Texas).
The <Municipality> value will correspond to the country specific (e.g., USPS) spelling of the
municipality name of interest (e.g. Plano, as in Plano, Collin County, Texas). Entries include ALL
of: postal, jurisdictional, MSAG community names.
Page 51 of 247
State,
State,
State,
of zip
State,
Note Where no record is provided for a particular state, this shall be equivalent to the situation
where a State, record is provided with an empty URL list. That is, it shall be interpreted that there
are no VDB facilities for that state.
Information in the file is order dependent by line. Lines may be blank and blank lines may be
ignored. End of line may be in DOS or UNIX format and indicated by either a carriage return/line
feed <CR><LF> or just a <CR>. All other whitespace characters may be ignored except where it
forms part of a state, county, or municipality name where they may be interpreted as a single space
character. State, county, and municipality names shall not include a comma or asterisk and should be
limited to alphabetical, space, and hyphen characters.
Page 52 of 247
2005:06:22 14:35:26Z
2005:06:26 00:01:00Z
2005:07:27 00:00:00Z
AL, *, *, *, vdbse.sbc.com
AL, Autauga, *, *, vdbse.sbc.com
AL, Autauga, Montgomery, *, vdb.rnopco.com;vdbse.sbc.com
AL, Autauga, Pratville, 36067, vdb.rnopco.com
AK, *, *, *, vdbak.bpac.com
AS, *, *, *, americansamoa-territorialauthority-vdb.asta.gov
:
: denotes actual contents not shown for brevity
:
FM, *, *, * [comment example of blank list; e.g. no VDB for Federated States
of Micronesia at this stage]
:
: denotes actual contents not shown for brevity
:
TX, *, *, *, vdbsw.sbc.com
:
: denotes actual contents not shown for brevity
:
WY, *, *, *, vdbwy.bigsky911.com;vdbnc.bpac.com
<eof>
Page 53 of 247
where <version> is a decimal integer of one or more digits and is greater than or equal to one (1).
The applicable country is a string representing the country of coverage. The strings USA or Canada
shall be used for these countries. For example:
Canada
The URL of the source file will be a standard dot delimited URL of the entity which generated the
data file. Nominally this is the ERDB root discovery URL. For example:
vdbroot.nena.org
The date and time of creation of the file shall be in the form:
Created <time>
Where <time> indicates when the file content was generated by the source and is of the form
YYYY:MM:DD HH:mm:SSZ
Where YYYY is the four digits representing the year, MM is the zero leading two digits representing
the month, and DD is the zero leading two digits representing the day number of the month. HH is
the zero leading hour of day, from 00 to 23. mm is the zero leading integer minutes of the hour and
SS is the zero leading integer seconds of the minute, both from 00 to 59. Z specifies that the time is
Zulu time The date and time of file creation date shall be provided in the universal time system
(UTS) and not be specific to a particular time zone as the root reports coverage over multiple time
zones, and the location of the requestor may not match that of the VDB/ERDB operator or the RDO.
The date and time of effect for the file shall be in the form
TakesEffect <time>
The effect date and time of the file shall be expressed using the same specification, in UTC, as the
creation date and time. This will be a date and time at which the contents of the file may be regarded
as valid. It shall be no earlier than the creation time and will supersede the contents of any previous
file at that time even if the expiry time of the previous file is after the effect time.
The date and time of expiry for the file shall be in the form
Expires <time>
The expiry date and time of the file shall be expressed using the same specification, in UTC, as the
creation date and time. This will be a date and time no earlier than the effect time. The contents of
the file must be considered invalid at this time and a file with a later effect time than the effect time
of this file must have been retrieved and its contents available to replace the current contents at least
by the time of expiry.
The rest of the file shall consist of the data representing ERDB URLs which service indicated
locations. It will be provided as an alphabetically ordered comma separated set of values which each
data record commencing on a new line. Each line will have the following format:
<State>, <County>, <Municipality>, <zip code>, <ERDB URL list>
Page 54 of 247
Note Where no record is provided for a particular state, this shall be equivalent to the situation
where a State, record is provided with an empty URL list. That is, it shall be interpreted that there
are no ERDB facilities for that state.
Information in the file is order dependent by line. Lines may be blank and blank lines may be
ignored. End of line may be DOS or UNIX format and indicated by either a <CR><LF> or just a
<CR>. All other whitespace characters may be ignored except where it forms part of a state, county,
or municipality name where they may be interpreted as a single space character. State, county, and
municipality names shall not include a comma or asterisk and should be limited to alphabetical,
space, and hyphen characters.
3.10.4.1 Example Directory File Format Civic Coverage
Below is an example ERDB Directory file in civic format.
Page 55 of 247
%!ERDB-Directory-file V1
USA
erdbroot.nena.org
Created
TakesEffect
Expires
2005:06:22 14:35:26Z
2005:06:26 00:01:00Z
2005:07:27 00:00:00Z
AL, *, *, *, erdbse.sbc.com
AL, Autauga, *, *, erdbse.sbc.com
AL, Autauga, Montgomery, *, erdb.rnopco.com; erdbse.sbc.com
AL, Autauga, Pratville, 36067, erdb.rnopco.com
AK, *, *, *, erdbak.bpac.com
AS,*, *, *, americansamoa-territorialauthrty-erdb.asta.gov
:
: denotes actual contents not shown for brevity
:
FM, *, *, * [comment example of blank list; e.g. no ERDB for Federated States
of Micronesia at this stage]
:
: denotes actual contents not shown for brevity
:
TX, *, *, *, erdbsw.sbc.com
:
: denotes actual contents not shown for brevity
:
WY, *, *, *, erdbwy.bigsky911.com; erdbnc.bpac.com
<eof>
The ERDB common name will be represented in a human-readable and recognizable format.
Version 2, August 11, 2010
Page 56 of 247
The date and time of creation of the file shall be in the form:
<createDate>yyyy-MM-ddThh:mm:ssZ</createDate>
Where [yyyy] is the four digits representing the year, [MM] is the zero leading two digits
representing the month, and [dd] is the zero leading two digits representing the day number of the
month. [hh] is the zero leading hour of day, from 00 to 23. [mm] is the zero leading integer minutes
of the hour and [ss] is the zero leading integer seconds of the minute, both from 00 to 59. The date
and time of file creation shall be provided in the Universal Time Coordinated (UTC) using the ISO
8601 [44] format and not be specific to a particular time zone. Since the root reports coverage over
multiple time zones, and the location of the requestor may not match that of the VDB/ERDB
operator or the RDO, a time-zone independent time is required.
The date and time of effect for the file shall be in the form:
<effectDate>yyyy-MM-ddThh:mm:ssZ</effectDate>
The effect date and time of the file shall be expressed using the same specification, in UTC, as the
creation date and time. This will be a date and time at which the contents of the file may be regarded
as valid. It shall be no earlier than the creation time and will supersede the contents of any previous
file at that time even if the expiry time of the previous file is after the effect time.
The date and time of expiry for the file shall be in the form:
<expiryDate>yyyy-MM-ddThh:mm:ssZ</expiryDate>
The expiry date and time of the file shall be expressed using the same specification, in UTC, as the
creation date and time. This will be a date and time no earlier than the effect time. The contents of
the file must be considered invalid at this time and a file with a later effect time than the effect time
of this file must have been retrieved and its contents available to replace the current contents at least
by the time of expiry.
Following the header shall be the definition of the GeoShape polygon representing the ERDB
coverage boundary expressed as a series of polygon points similar to those shown in Figure 3-5,
Page 57 of 247
A complete ERDB geo directory will consist of the above definitions for all ERDBs served by the
RDO.
An example of an ERDB geodetic directory file is presented below.
3.10.5.1 Example ERDB Geodetic Directory File
Below is an example of an ERDB Geodetic Directory File:
Page 58 of 247
<?xml version="1.0"?>
<erdbBoundaryDefinition xmlns="urn:nena:xml:ns:es:geoErdbRdo"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="urn:nena:xml:ns:es:geoErdbRdo.xsd">
<erdbID>
<erdbURI>https://www.erdb.harriscounty.tx.gov/erdb.html</erdbURI>
<erdbCommonname>Harris County Texas ERDB</erdbCommonname>
<createDate>2006-10-01T13:00:00Z</createDate>
<effectDate>2006-10-05T17:00:00Z</effectDate>
<expiryDate>2006-11-01T13:00:00Z</expiryDate>
</erdbID>
<gml:Polygon srsName="urn:ogc:def:crs:EPSG:4326"
xmlns:gml="http://www.opengis.net/gml">
<gml:exterior>
<gml:LinearRing>
<gml:pos>42.556844 -73.248157</gml:pos>
<gml:pos>42.549631 -73.237283</gml:pos>
<gml:pos>42.539087 -73.240328</gml:pos>
<gml:pos>42.535756 -73.254242</gml:pos>
<gml:pos>42.542969 -73.265115</gml:pos>
<gml:pos>42.553513 -73.262075</gml:pos>
<gml:pos>42.556844 -73.248157</gml:pos>
</gml:LinearRing>
</gml:exterior>
</gml:Polygon>
</erdbBoundaryDefinition>
Page 59 of 247
The VEP is compliant with IETF best current practices as defined in draft-ietf-ecritphonebcp;
The VEP has knowledge of PSAP Call Control features being enforced;
The VEP supports the PSAP Call Control features as defined herein.
The Called Party Hold feature, also known as Connection Hold, Bureau Hold, Network Hold and
Originator Hold, allows the voice path and other resources associated with a 9-1-1 call to remain,
even if the caller hangs up (goes on-hook). This "disconnect pending" state is sustained until the
PSAP attendant hangs up or some specific timer expires. While in the "disconnect pending" state, if
the caller picks up again, the caller will find themselves connected to the attendant. The Called
Party Hold feature is the parent of Enhanced Called Party Hold, Switch Hook Status, and Ringback.
As a complement to the Called Party Hold feature, Enhanced Called Party Hold allows the voice
circuit to be established even though the PSAP attendant hasn't yet answered when the caller hangs
up. Once the attendant picks up, regular connection hold capabilities apply. Therefore, if the caller
picks up again, his conversation with the attendant will resume.
The Switch Hook Status feature, also known as Disconnect Signal, allows the PSAP attendant to
detect that the caller has either hung up (on-hook) or picked up the phone (off-hook). A particular
tone is generated to signal the PSAP attendant of the change in the "hook status" of the caller. In an
i2 implementation that supports PSAP Call Control features, additional signaling must be sent from
the VEP to the ESGW whenever the caller goes on-hook or off-hook. Note that the ability for the
PSAP attendant to hear the switch hook status tone is dependant on the ability of the SR and/or
PSAP CPE to generate it. If either the VEP or the PSAP do not support Switch-hook Status on top
of Called Party Hold as described above, the feature will not be enforced end-to-end. As such, a
caller going on-hook may go unnoticed.
The Ringback feature enables the PSAP attendant to invite back an emergency caller, or someone in
the vicinity of the phone, into the conversation. This feature has different behaviors depending on
Version 2, August 11, 2010
Page 60 of 247
Page 61 of 247
Page 62 of 247
Security
The critical nature of the E9-1-1 Emergency Services Network makes it essential to ensure that the
E9-1-1 network is properly protected. The i2 solution introduces new network elements, new
underlying transport networks and protocols to the E9-1-1 Emergency Services network. Note that a
number of protocol interfaces are outside the scope of the 9-1-1 system (v0/v1) and several that are
between elements that are considered to be within the 9-1-1 system (v2, v3, v4, v5, v6, v7, v8, v9
and v-E2). The former are specified by other standards organizations, such as the IETF. The latter
are defined in this document. For the interfaces within the scope of this document, the security
mechanisms are dependent on the specifics of the underlying network joining the various i2 solution
network elements.
Specifically, if the network that joins the network elements is private, secured, and managed such
that there is no reasonable possibility that anyone not specifically authorized to see E9-1-1 data (and
specifically location data) has access to any systems on that network, it will not be required to
deploy additional security measures. It should be noted that it is extremely difficult to guarantee that
a network is completely private, secured and managed with no reasonable possibility of unauthorized
access, therefore it is not recommended that such walled gardens be the only security provided. It
is recommended that even if private networks are used to implement the i2 interfaces, additional
security mechanisms described in this section be used.
The following sections provide recommendations on the steps that can be taken to minimize the risk
of compromise to the E9-1-1 network.
4.1
Authentication
Authentication is the process of verifying the claimed identity of a session requester. Mutual
authentication is important to ensure that both the originator of the session and the recipient of the
request are both satisfied with the credential information being provided. Authentication
mechanisms are needed in the i2 solution to ensure that only trusted entities with existing
relationships will be provided access to E9-1-1 data and services.
Authentication in the i2 solution is provided by using certificates. A certificate is a data object that
includes the servers identity and its public key. The certificate is signed by computing its hash value
and encrypting it using a certificate authoritys private key. A certificate authority is a trusted third
party that issues digital certificates. The certificate authority guarantees that the holder of the digital
certificate is who they claim to be. NENA shall create (or contract for) a Valid Emergency Services
Authority (VESA) to operate as a certificate authority, and to be the root of all certificates issued to
entities participating in an i2 call.
Page 63 of 247
Message Integrity
Message integrity mechanisms provide protection against unauthorized message modifications. One
of the ways this is accomplished is by using one-way hash functions. Hashing is the transformation
of a string of characters into a usually shorter, fixed-length value that represents the original string. If
the original message is tampered with, the message hash will not match the original message. This
helps to detect that the message was tampered with.
It is recommended that elements involved in the i2 solution deploy message integrity using Secure
Hashing Algorithm-1 (SHA-1), as defined in RFC 3174 [19] or better.
4.3
Message Encryption
Message encryption is a process of disguising a message in such a way as to hide its substance. The
need for encryption of messages is a function of the level of confidence in the network being used to
implement the i2 solution interfaces. If the network being used to implement an i2 solution interface
is vulnerable, then encryption techniques should be implemented to protect the messages.
If encryption is needed, Advanced Encryption Standard (AES), Federal Information Processing
Standards Publications (FIPS) PUB 197[16] or better will be used as the means to encrypt the
messages.
4.4
An important aspect of maintaining security in a network is ensuring that the network elements that
constitute the network are secure. This includes physical security of the equipment and ensuring that
data contained in the network elements are accessed by only those personnel that have a need to
access the data.
It is recommended that network elements involved in the i2 solution employ authorization and
privacy mechanisms to protect E9-1-1 data.
The network elements should support the ability to authenticate users, control user access privileges,
initiate audit trails, report security alarms, recover from intrusions, and monitor data and system
integrity.
4.5
If the i2 solution interfaces are implemented on a network that is not private, secure and managed,
tunneling is an alternative that could be used to implement the interfaces. One acceptable mechanism
is to use IPsec [17] tunnels with strong authorization, integrity protection and privacy, at least
equivalent or stronger than RSA-1024/SHA-1/AES joining network elements which are secured, and
managed such that there is no reasonable possibility that anyone not specifically authorized to see
Version 2, August 11, 2010
Page 64 of 247
The applications themselves can be secured using, for example, Transport Layer Security (TLS),
RFC 4346 [22], with strong authorization, integrity protection and privacy, at least equivalent or
stronger than RSA-1024/SHA-1/AES (RFC5246[23]) as long as the systems the protocols are
running on are reasonably protected against unauthorized persons being able to modify the
applications.
It is recommended that TLS be used to secure the following vX interfaces: v2, v3, v4, v5, v6, v7, v8,
and v9.
4.7
The existing Emergency Services Network provides a relatively high degree of security for
correctness of information, integrity, and authorization of access, authenticity/secrecy, and accuracy
of information. The intent of the NENA i2 solution is to provide functional equivalency to the
existing network services in an IP-based environment, and this includes ensuring that the location
information is valid and secure.
Voice over IP presents new challenges and security issues as it breaks the bond between access and
service provider characteristic of legacy networks, and at this time, lacks the legislative and
regulatory requirements that apply to more conventional telephony services. These security threats
present themselves in a number of forms and have varying degrees of severity, should they be
exploited to their full potential. This section attempts to outline the key security concerns related to
location data, and where in the i2 solution these concerns are best addressed. This section does not in
itself provide solutions to these concerns.
Current networks use location information to route calls to the local PSAP, and to provide a location
to which emergency responders may be dispatched. Three important characteristics of existing
networks contribute to the security of these functions:
1. The source of the location is attributable to a specific trusted source. Location is provided by
the access/voice service provider.
2. The location information is applicable to a specific point in time. The location information is
either used to directly route the call (as may be the case for wireless), or indirectly via the
calling number/ANI (as for wireline). It is always retrieved at the time of call receipt.
Page 65 of 247
Page 66 of 247
Functional Requirements
This section provides high-level functional requirements for the new elements in the i2 solution
architecture that are described briefly in Section 3.3. For elements defined in other standards (e.g.,
Call Server, Routing Proxy, Redirect Server), this document identifies only incremental functional
requirements to support the i2 solution.
5.1
This element is owned by the VSP and is always present, and always in the signaling path of a call.
If the signaling protocol is SIP, this element is a proxy server as defined in RFC3261. The VSP Call
Server receives a call from one of its subscribers on the v1 interface and must recognize that it is an
emergency call. Procedures for this vary depending on protocol and end device capability. For SIPbased systems, VSPs must be capable of recognizing an emergency call (e.g., based on the tel-URI
with digits 911, a SIP-URI with a dial string of 911 in the user part, and eventually recognizing
<urn:service:sos> ).
Upon determining that a call is an emergency call, the VSP must determine the location of the caller.
Location information may accompany the call (in SIP, this would be in the form of a PIDF-LO body
in the INVITE message), may be requested of the endpoint, or the VSP may have access to a LIS
which has the location of the caller. 6 In addition, upon determining that a call is an emergency call,
the VSP Call Server must determine, using local procedures, the provisioned callback number and
subscriber name associated with the address of record for the subscriber.
The VSP CS may be implemented in one of several ways:
1. It may operate or contract with a VPC.
2. It may operate or contract with a RP.
3. It may operate or contract with a RS.
In case 1, the VSP CS maintains a v2 interface. It queries the VPC for Routing Information/ESQK
by sending information on the v2 interface. The VSP CS may be required to translate an ERT to an
ESGWRI, based on business arrangements between the VSP and VPC provider. The VSP CS
maintains routing data which maps an ESGWRI to the URI of the appropriate ESGW. It uses this
data to obtain the URI, and forwards the call on the v4 interface, with the ESGWRI, ESQK, callback
number, and optionally subscriber name to the ESGW. At the end of the call, the Call Server/Proxy
is responsible for sending a call termination message to the VPC which includes the identity of the
ESGW that was used for the call.
In case 2, the VSP CS unconditionally forwards all emergency calls (along with the associated
callback number, subscriber name information and LO and/or LK) to the RP on the v6 interface. The
RP is expected to interact with the VPC to obtain call routing information and to forward the call to
6 The ability for the VSP call server or other proxies in the call path to retrieve location when it is not available from the endpoint has
been included in Section 8.8 as a potential item for investigation in a future issue of this document.
Page 67 of 247
5.1.1
No incremental authentication and authorization requirements are specified for the VSP CS in this
document. However, authentication is advisable such that the CS can assert the subscriber name and
callback number to be supplied with the emergency call. Details on how a VSP can implement
authentication are out of scope of this document.
5.1.2
Performance
No normative performance requirements are specified in this document. Guidelines are provided in
Section 9.7.
5.1.3
No incremental reliability and availability requirements are specified for the VSP CS in this
document.
Page 68 of 247
This element is optionally present in the call path. If the signaling protocol is SIP, this element is a
proxy server as defined in RFC 3261 [5]. When deployed, the RP receives emergency calls (only,
i.e., dedicated to emergency services) forwarded from the VSP CS on the v6 interface. It maintains a
v2 interface to query the VPC for routing information/ESQK. The RP may be required to translate
an ERT to an ESGWRI, based on business arrangements between the Routing Proxy service
provider and VPC provider. The RP maintains routing data which maps an ESGWRI to the URI of
the appropriate ESGW. It uses this data to obtain the URI, and forward the call on the v4 interface,
with the ESGWRI, ESQK, PIDF-LO, subscriber name and callback number, to the ESGW.
For Routing Proxies using SIP, the Record Route header should be specified to keep the proxy in the
call signaling path.
In cases of failure, the Routing Proxy shall be capable of providing contingency routing based on the
LRO that it receives.
Routing Proxies shall keep call event records for troubleshooting purposes.
It is recommended that the Routing Proxy shall save (subject to local regulations/restrictions), for
troubleshooting purposes, the following information associated with a call:
5.2.1
The RP should implement authentication mechanisms and may enforce authorization policies.
5.2.2
Performance
No normative performance requirements are specified in this document. Guidelines are provided in
Section 9.7.
5.2.3
An RP dedicated to emergency services shall be highly reliable and available. It is an objective that
the RP be available to the CS at a service availability level of 99.999%.
5.3
Redirect Server
This element is optionally present. If the signaling protocol is SIP, this element is a proxy server as
defined in RFC 3261 [5]. When deployed, the RS receives emergency calls (only) forwarded from
the VSP CS on the v5 interface. It maintains a v2 interface. It queries the VPC for ERT/ESQK or
ESGWRI/ESQK by sending information, including location, callback number, and subscriber name,
on the v2 interface. It then unconditionally forwards the SIP 300 Message on the v5 interface, with
Version 2, August 11, 2010
Page 69 of 247
5.3.1
The RS should implement authentication mechanisms and may enforce authorization policies.
5.3.2
Performance
No normative performance requirements are specified in this document. Guidelines are provided in
Section 9.7.
5.3.3
An RS dedicated to emergency services shall be highly reliable and available. It is an objective that
the RS be available to the CS at a service availability level of 99.999%.
5.4
The ESGW takes VoIP delivered calls and converts them to circuit-switched signaling and media for
delivery into the E9-1-1 Selective Routing Network.
The ESGW implements the v4 interface. It accepts a call with an ESGWRI, ESQK, callback number
and, optionally subscriber name and uses the ESGWRI to select an outgoing trunk group to the E91-1 network. The ESGW maintains mapping data that associates the ESGWRI with the appropriate
outgoing trunk group. It is expected that the ESGW will implement dedicated 9-1-1 trunks to the SR.
The ESGW provider and the VSP are expected to negotiate the codecs that are to be supported.
These trunk groups or routes use traditional telephony signaling schemes to deliver the emergency
call over dedicated voice channels between the gateway and the E9-1-1 network. These trunks
originate at the ESGW and terminate at the SR, as designed to meet the needs and constraints of the
particular E9-1-1 network for the callers location.
In general, the trunking protocol, and the trunk design will be determined based on the capabilities
(and requirements) of the destination E9-1-1 network.
Likely candidates for these circuits are:
Version 2, August 11, 2010
Page 70 of 247
SS7 signaling, which can be used to signal either just the ESQK or both the ESQK and
callback number, depending on the way the trunks are provisioned at the ESGW.
- If only an ESQK is signaled to the SR, the IAM includes a Called Party Number (CdPN)
of 911, (or 11, or 1) and the ESQK in the Calling Party (CgPN) and/or Charge
Number parameter(s). The 10 digit ESQK is used to represent the call key.
If both the ESQK and the callback number are to be signaled to the SR, the IAM includes
a Called Party Number (CdPN) of 911 (or 11, or 1), the callback number in the
Calling Party (CgPN) and/or Charge Number parameter(s), and the ESQK in the Generic
Digits Parameter 7 (GDP). Note that if both the ESQK and callback number are expected
to be signaled over a particular trunk group, but the callback number is not available, the
ESGW is expected to generate a non-dialable callback number of the form 911 + the last
seven digits of the ESQK, and deliver the call to the SR with the non-dialable callback
number signaled as the Calling Party Number (CgPN) and/or Charge Number, and the
ESQK signaled in the Generic Digits Parameter (GDP).
Traditional CAMA signaling, which can be used to signal either just the ESQK or both the
ESQK and callback number, depending on trunk provisioning.
If only an ESQK is to be signaled to the SR, a called number of the form 911, 11, or
1 , and an ANI of the form I [single info digit] plus a 7-digit ESQK value, shall be
outpulsed, with both digit streams contained between the KP and ST pulses. Note that
since the ESGW will be receiving a 10-digit ESQK value, this assumes that the ESGW
will convert the received 10-digit ESQK value to a 7-digit ESQK value.
If both the ESQK and the callback number are to be signaled to the SR, the ESQK will be
outpulsed as the called number, and the ANI stream will consist of a single ANI I digit
plus the last 7 digits of the callback number 8.
These trunk groups may not be used to originate traffic back into the ESGW, but once the call is
established, provide for two way voice communication.
In general, the 9-1-1 service provider will have technical standards, or accessibility letters that define
the allowable signaling schemes to be used within their network. In many cases, the ESGW operator
may also need to negotiate with the individual Public Safety Operators within a given geographic
area before these circuits can be ordered to, or through the SR Operator.
Sizing of trunk groups between ESGWs and SRs is a subject for a future study. This is a complicated
issue because, unlike wireline call delivery where an end office serves a fixed population, the
population served by a VSP is expected to be variable. Further complicating this issue is the fact that
a VSP is probably connected to multiple ESGWs and ESGWs are expected to be connected to
multiple VSPs. This many-to-many relationship makes determination of VoIP 9-1-1 traffic loads at
ESGWs an issue that needs further study.
7 NENA 03-503 [32] also allows the ESQK to be signaled as the called number in some implementations.
Page 71 of 247
The ESGW should implement authentication mechanisms and may enforce authorization policies.
5.4.2
Performance
No normative performance requirements are specified in this document. Guidelines are provided in
Section 9.7.
5.4.3
An ESGW dedicated to emergency services shall be highly reliable and available. It is an objective
that the ESGW be available to the CS/RP at a service availability level of 99.999%.
5.5
This section provides the high-level functional requirements for the ERDB.
The ERDB has two main functions:
5.5.1
the ERDB is responsible for storing boundary definitions for each ESZ in its service area,
along with associated routing information;
the ERDB is responsible for delivery of routing information to the VPC.
Receiving and Storing Routing Information
The ERDB shall support storage of the boundary definitions for ESZs and the mapping of civic
address or geo-spatial coordinate location information to a particular ESZ. The ERDB shall be able
to identify the ESZ associated with any given civic address in its serving area, where the civic
address can be uniquely mapped to an MSAG-valid address. The ERDB shall be able to identify the
ESZ associated with any given pair of coordinates that are within its serving area.
The ERDB also stores attributes for each ESZ. For each ESZ, the ERDB shall be able to store the
following information needed for routing:
a Selective Routing Identifier associated with the primary SR that serves the ESZ in the i2
solution;
the routing ESN within that primary SR that is associated with the ESZ;
an NPA that is associated with the outgoing route to the Selective Router.
Some PSAPs use administrative ESNs, different from the routing ESN associated with the ESZ. This
administrative ESN is also used in the ALI DB to identify a particular set of Police, Fire, and
Medical English Language Translations. The ERDB shall also be able to store an administrative
ESN for an ESZ, if applicable.
CRNs are 10-digit 24x7 PSAP numbers that are used for routing emergency calls under network
failure conditions. A CRN must be associated with each SR/routing ESN combination.
Page 72 of 247
The ERDB shall be able to receive either or both civic and geodetic location information in a routing
query.
Whenever the ERDB receives a routing query containing valid location information from an
authorized VPC, the ERDB shall attempt to map the location information to the applicable ESZ and
its associated routing information.
Page 73 of 247
Page 74 of 247
An ERT comprising:
- A Selective Routing Identifier, if available.
- A routing ESN, if available.
- An NPA, if available.
A CRN, if available.
An Administrative ESN, if applicable.
An indication of whether civic or geo location information was used to determine routing (if
both civic and geo location information were received).
NOTE: If the PSAP does not support dedicated trunks and E9-1-1 facilities, emergency calls will be
routed to the PSAP via the PSTN, using a 24x7 E.164 number. In that case, the ERDB response will
indicate success, but the only routing information provided will be the CRN (i.e., ERT will not be in
the response).
If civic location information was received in the routing query, the ERDB shall also include the
transformed address information in its response to the VPC. The MSAG-valid address includes the
following data elements, as applicable:
Page 75 of 247
House Number
House Number Suffix (if applicable)
The ERDB may steer the routing query to the appropriate ERDB and then pass the received
response from that remote ERDB toward the requesting VPC.
NOTE: The steering procedures are incomplete at this time. Further work will be required to fully
define steering procedures. This may be a topic for a future issue of this Standard.
5.5.2.6 Error Handling
If the ERDB receives civic or geodetic location information that identifies a location within its
serving area for which it cannot determine any routing information, the ERDB shall return a
response to the VPC indicating that routing information is not available, also including the reason for
the failure.
If the ERDB receives civic or geodetic location information that identifies a location which is not
within its serving area and it cannot determine the ERDB to which the civic or geodetic location
information should be steered, the ERDB shall return an error response to the VPC indicating that
routing information is not available and indicating the reason for failure.
If the ERDB receives an error message in response to a routing query steered to another remote
ERDB, the ERDB shall pass the received error response received from the remote ERDB to the
VPC, including the reason for failure.
5.5.2.7 Default Routing
Default Routing may be invoked when a received civic address does not resolve to a single MSAG
address. For example, the location received matches at the state level but not at the municipality
level.
ERDB providers are encouraged to provide the default routing options described in this section. If
any default routing is to be provided, it is critical that the 9-1-1 Authorities work with the ERDB
provider to determine which of the default routing options described here should be offered for their
area. The 9-1-1 Authority must also work with the ERDB provider to build, approve and maintain
routing data. The ERDB shall not provide any default routing without the 9-1-1 Authoritys explicit
approval.
The 9-1-1 Authority can designate any ESN as a default ESN. Because there is currently no explicit
way for the VPC to communicate to the ALI system that a call has been default routed, it is
preferable that the 9-1-1 Authority specify distinct ESNs to be used as defaults so that the ESN itself
Version 2, August 11, 2010
Page 76 of 247
Default Geodetic Routing. This type of routing has the potential to closely match how a call
would be routed if the location was MSAG valid. In order for this type of default routing to
be done all of these conditions must be met:
o The ERDB must have street-level GIS information (either commercial 11, or provided
by the 9-1-1 Authority).
o The ERDB must maintain correct ESN polygon boundaries (which are ideally
provided by the 9-1-1 Authority).
o The address presented must be successfully geo-coded (i.e. when looking up the
submitted address in the street-level information, a successful result is returned).
Geo-coding is not a required function of the ERDB.
Default Tabular Routing. This type of routing is less likely to match how a call would be
routed if the location was MSAG valid. It requires that the 9-1-1 Authority determine ESNs
for default routes at the Postal Zone, Community, County and State level.
When default route ESNs are used, the MSAG-valid civic address parameter returned by the ERDB
should have the address fields set to Verify in any fields not determined to be accurate. The VPC
should set the Class of Service to V (especially in the case of reuse of the wireless default ESNs)
in the data returned by the VPC over the v-E2 interface.
If the 9-1-1 Authority does not make any choices in regards to handling invalid addresses, the ERDB
shall return a 400 Result Code (ErrorBadLocation) to the VPC. The VPC will then be responsible
for determining how to handle the call.
5.5.2.7.1 Default Geodetic Routing Requirements
The ERDB may provide the ability to default route based on a geo-coded civic location. If a nonMSAG valid civic location is presented and that location can be successfully geo-coded, the ERDB
may use the same routing methodology used for calls where lat/long is the only information
provided in the erdbRequest message. The ERDB should include the geocoded location in the
erdbResponse message. The 9-1-1 Authority should approve the GIS data used for geo-coding.
10 Some PSAP representatives have suggested that using pre-i2 VoIP ESNs as the default routes would help the call-taker identify
Page 77 of 247
Postal
Community
County
State
Found 12
found
found 13
found
Found
not found
found
found
Found
Found
not found
not found
not found
not found
found
found
not
found
found
found
found
not
found
found
or empty
not
not found
found or
Return
Code
211
213
400
214
County + State
215
212
12 Data specified as found means that an entry has been found in the Tabular Routing tables that matches the value from the Civic
Location.
13 If county is not supplied as part of the Civic Location it should be looked up using Postal Zone (if supplied) or Postal Community
and State.
Page 78 of 247
empty
not
found or
empty
not
found or
empty
Postal
Community
County
State
Return
Code
not found
not found
found
State
216
not found
not found
not
found
Return Error
400
76148
76148
76148
76148
76148
City
County
Fort Worth
Haltom City
Watauga
Tarrant
Tarrant
Tarrant
Tarrant
Fort Worth
Tarrant
Tarrant
Denton
Denton
State
TX
TX
TX
TX
TX
TX
TX
TX
TX
ESN
00002
00003
00004
00001
00099
00007
00001
00900
00101
Note there are no zip codes that cross counties in the USPS data
Routed On
Return
Code
ESN
211
00004
212
00001
213
00099
214
00101
Page 79 of 247
400
City, County and State
214
00007
215
00001
State
216
00900
The following table illustrates all of the ways that the ERDB can determine routing based on the data
submitted in the erdbRequest:
Table 5-4 ERDB Routing
Data in Request
Data in Response
ERDB Processing
MSAG
found
GeoCode
found
Routing
Method
Civic
Geo
n/a
MSAG
Default Geo
Default Tabular
Y
Y
N
N
Y
Y
Y
N
Y
N
n/a
n/a
n/a
n/a
n/a
n/a
MSAG
Geo
Geo
Error Returned
Result
Code
201
210
211, 212,
213, 214,
215, 216*
201
200
200
401
MSAG
GeoCoded
Location
Y
N
N
N
N
N
N
N
Note: The order of items in this table does not imply that the ERDB will always attempt to geo-route
before attempting to tabular-route. The 9-1-1 Authority may choose to do tabular routing instead of
(or before) Geo-routing when a Civic Address that is not MSAG-valid is presented.
* Note an address may also be determined to be not in the serving area in which case the ERDB
will return 562.
Page 80 of 247
Performance
No normative performance requirements are specified in this document. Guidelines are provided in
Section 9.7.
5.5.5
The ERDB shall be available to support routing queries with a reliability of 99.999%.
5.6
This section provides the high-level functional requirements for the VPC. The main functions of the
VPC are to:
5.6.1
Support the routing of emergency calls originated by VoIP customers to the appropriate
PSAP by providing critical routing information to the Call Server/Proxy;
Deliver caller location, callback number, and subscriber name information in response to
queries from ALI databases.
Support for Emergency Call Routing
There are a number of capabilities required of the VPC to support its role in providing routing
information to the Call Server/Proxy to support the routing of VoIP emergency calls. The VPC must
be able to process routing requests from a Call Server/Proxy, and if necessary, interact with a LIS to
obtain the callers location information. The VPC must use the location information, obtained from
the routing request or from the LIS, to generate a routing query to an ERDB to obtain routing
information associated with the callers location information. The VPC must then use this
information to generate a response to the Call Server/Proxys routing request. In addition, the VPC
will have to support contingency/default routing under certain failure scenarios. The following
subsections describe the functionality required of the VPC to support each of these aspects of VoIP
emergency call routing.
Version 2, August 11, 2010
Page 81 of 247
Identification of the entity that is requesting emergency call routing, including a 24x7
number/address that can be used to reach that entity and the host ID associated with that
entity;
An identifier that can be used to uniquely identify the call/transaction at the Call
Server/Proxy;
An E.164 callback number that can be used by the PSAP to reach the call originator, if
available;
Customer Name information, if available;
A Location Information Element (LIE) containing either a PIDF-LO or a Location Key to
support interactions with an LIS to obtain the PIDF-LO.
An identifier for the callers Voice Service Provider, if available
In addition, the VPC shall be capable of processing the following optional information in a routing
request from a Call Server/Proxy:
A Date Time Stamp indicating the UTC date and time the message was sent;
An identifier for the destination VPC;
An identifier inserted by the originating network that may be used by a LIS to validate that
the received Location Key belongs to the originating network.
The VPC shall support the capability to authenticate the entities from which it is allowed to receive
routing requests.
Based on the credentials of the entity from which a routing request is received, the VPC shall
support the capability to control the access of the entity to routing information accessible by the
VPC.
5.6.1.2 Generation of Queries to LIS to Obtain Location Information
If the VPC does not receive a PIDF-LO in the LIE of the routing request from the Call Server/Proxy,
the VPC may query an LIS for caller location information, based on agreements between the VPC
provider, the LIS provider, and the VSP.
The details of the v3 interface used by the VPC to query a LIS for location information will be
specified in a future issue of this specification.
5.6.1.3 Generation of Routing Queries to the ERDB
Once the VPC receives an LIE containing caller location information, the VPC shall query an ERDB
to obtain routing data for the call. The VPC shall identify the appropriate ERDB to which to direct
the routing query by accessing discovery data that identifies the URL of the ERDB(s) that serves the
emergency callers location. If the VPC has received caller location information consisting of a
Version 2, August 11, 2010
Page 82 of 247
A Message ID that will identify the message and allow for correlation of the query and the
response;
The identifier of the node requesting the routing information (e.g., the VPC);
A civic location, a geodetic location, or both a civic location and a geo location.
Note that the VPC shall use the first location-info element to populate the routing query. If the
location information contains a geodetic location, and the coordinate system associated with that geo
location is something other than WGS84, the VPC shall convert the geodetic location to WGS84
[35] prior to sending it to the ERDB in the routing query.
In addition to the information identified above, the VPC may also include the following information
in the routing query to the ERDB:
A Date Time Stamp indicating the UTC date and time that the message was sent;
Identification of the ERDB from which routing information is being requested.
A Message ID that allows for correlation of the query and the response;
The identity of the node directly responding to routing query sent by the VPC;
An ERT comprised of:
o The Selective Routing Identifier associated with the callers location;
o The routing ESN associated with the callers location;
o The NPA that is associated with the outgoing route to the Selective Router appropriate
for the callers location;
The administrative ESN associated with the callers location (if present in the routing data at
the ERDB);
The CRN that identifies the 24x7 E.164 number of the alternate PSAP to which emergency
calls should be routed under various abnormal conditions, if present in the routing data at the
ERDB. (See Section 3.7 for further discussion of contingency/default routing procedures);
14 Please refer to [18] for recommended methods to construct a routable PIDF-LO document.
Page 83 of 247
An indication of whether the ERDB was successful in providing routing information or the
ERDB invoked default routing, and the basis on which the routing information was
determined (i.e., a civic location or a geodetic location);
The MSAG-valid format of the civic address provided by the VPC in the routing query
The geo-coded location used in default routing (if geodetic default routing was applied at the
ERDB);
A VPC Identifier that identifies the VPC that initiated the query;
A Date Time Stamp that indicates the UTC date and time that the message was sent;
An identification of the ERDB that was the original source of the routing information (which
may or may not be the same as the ERDB that is directly connected to the querying VPC).
Upon receiving the response message from the ERDB, the VPC shall use the Selective Routing
Identifier, routing ESN, and NPA contained in the response message to identify the appropriate pool
of ESQKs for the call. From this pool of ESQKs, the VPC shall select an available ESQK value to
associate with the call. The VPC shall also set a guard timer once the ESQK has been associated
with the call. The recommended value for the guard timer is 8 hours in duration but can be settable
to an appropriate value based on statistical data by the VPC operator. The length of the guard timer
will affect the size of the ESQK pool. The VPC shall maintain an association between the ESQK and
the other call-related information (e.g., callback number, subscriber name, location, Provider
information) until it either receives an indication from the Call Server/Proxy that the call has
terminated or the guard timer expires (whichever occurs first), at which point the ESQK value will
be released.
The VPC shall hold one ESQK value within each pool in reserve to be used when there are no other
ESQK values within the pool available for association with an emergency call request. The VPC
shall associate this reserved (i.e., default) value with all new emergency call requests that require an
ESQK from a particular pool until such time as another ESQK value within that pool becomes
available. When a default ESQK is allocated to multiple simultaneous calls, the VPC will not be able
to provide call-related information to the ALI system.
As described in Section 3.3.9, the VPC may, optionally, be responsible for translating the Selective
Routing Identifier, routing ESN and NPA (which make up the ERT) received from the ERDB to an
ESGWRI. To support the ESGWRI translation function, the VPC will need to establish a
relationship with the ESGW operators whose systems interconnect with VPC customer systems (i.e.,
Call Server/Proxies). (See Section 7 for further discussion of Roles and Responsibilities). For each
ESGW, the VPC shall store mappings between Selective Routing Identifiers/NPAs/routing ESNs
and ESGWRI values. The VPC will have to have some knowledge about the routing logic supported
by each Call Server/Proxy it serves so that it will know which ESGWRI (i.e., associated with which
ESGW) it should return. Implicit in this arrangement, is the need for each ESGWs ESGWRI values
to be unique. Otherwise, upon receiving the ESGWRI from the VPC, the Call Server/Proxy will not
know to which ESGW the call should be routed (if the Call Server/Proxy interconnects with multiple
ESGW operators systems).
Page 84 of 247
Page 85 of 247
The VPC receives a badly structured routing request from the Call Server/Proxy (i.e., the
request message cannot be parsed or is malformed);
The routing request from the Call Server/Proxy contains neither a Location Key nor a PIDFLO;
The VPC receives a PIDF-LO in the routing request from the Call Server/Proxy, but it cannot
determine, based on the received location, which ERDB to query for the routing data;
The VPC receives a PIDF-LO in the routing request from the Call Server/Proxy, but when it
uses it to query the ERDB for routing data, it receives either an error response or no response
from the ERDB;
The VPC receives a Location Key in the routing request from the Call Server/ Proxy, but it
cannot determine where to send the location query (i.e., it cannot determine the appropriate
LIS);
Page 86 of 247
The VPC receives a Location Key in the routing request from the Call Server/ Proxy, and is
unable to successfully retrieve a PIDF-LO from the LIS (i.e., it receives an error response or
no response from the LIS).
In all of these scenarios, the VPC is unable to successfully obtain routing data from the ERDB and
provide it in a response to the Call Server/Proxy.
If the VPC is unable to successfully obtain routing data from the ERDB and provide it in a response
to the Call Server/Proxy, the VPC shall send a response message to the Call Server/ Proxy that
indicates the nature of the error that occurred. The message may also include a default routing
number (i.e., a 24x7 number associated with a call center), as determined based on prior agreements
between the VPC provider, the VoIP Service Provider, and the call center to which calls are to be
default-routed. (The default routing number will be populated in the Last Routing Option parameter
of the response message).
If a VPC is responsible for performing the ERT-to-ESGWRI translation, but it is unable to
successfully perform this translation for a specific ERT provided by the ERDB, the VPC shall send a
response message to the Call Server/Proxy that provides default routing information (consisting of a
CRN, if one was returned by the ERDB) in an LRO. It is not recommended that the ESQK be
included in the response to the Call Server since the VPC could not determine an ESGWRI.
Another type of abnormal condition that might be encountered at the VPC is related to a lack of
resources at the VPC. As described previously, one of the roles of the VPC is assigning an ESQK to
an emergency call from the appropriate ESQK pool that is associated with the Selective Routing
Identifier/routing ESN/NPA received from the ERDB. It is possible, in certain situations, for the
VPC to successfully receive routing data from the ERDB, but have no ESQKs available from the
applicable pool (other than a default ESQK) to associate with the specific call instance. The ESQK
exhaust could be caused by an unusually large number of calls being originated from a particular
geographic area, or due to some error in the allocation of the ESQK pool or in the de-allocation
process. If the VPC successfully receives routing data from the ERDB, but does not have an ESQK
available from the pool associated with the Selective Routing Identifier/routing ESN/NPA provided
in the ERDB response, the VPC shall return a routing response message to the Call Server/Proxy
that contains the reserved (i.e., default) ESQK value for the pool, along with either the ESGWRI (if
the VPC performed the ERT-to-ESGWRI translation) or the Selective Routing Identifier, routing
ESN and NPA (if the VPC did not perform the ERT-to-ESGWRI), and the CRN provided in the
response from the ERDB. (The CRN will be populated in the Last Routing Option parameter of the
response message).
A potential error scenario that could be encountered at the VPC related to the release of ESQKs is
the receipt of a call termination message containing an ESQK value that is not in use. If such an
error occurs, it is desirable that the VPC log the error and make a maintenance count.
5.6.2
As described above, the VPC will play an important role in delivering call and location-related
information for VoIP emergency calls to the ALI database for subsequent delivery to the PSAP to
Version 2, August 11, 2010
Page 87 of 247
Page 88 of 247
The ESMEIdentification coded with the identification of the ALI Database that initiated the
query.
A PositionResult.
One or both of:
- Position information consisting of latitude and longitude as WSG84 information, and
altitude in meters, if available. If present, a Position Source will also be provided to
identify the method used to determine the location information.
- A Location Description (consisting of detailed street address information), if the location
information associated with the call instance is populated with a civic location.
A Callback Number, if available in the information associated with the call instance.
A subscriber name (populated in the Location Description), if available in the information
associated with the call instance.
An Emergency Services Routing Key, populated with the ESQK received in the ESPOSREQ.
An ESQK Date and Time Stamp.
A CompanyID, if the data associated with the call instance includes the NENA ID for the
VSP. If the NENA ID for the VSP is not available then the NENA ID of the entity at the
other end of the v2 interface is provided.
See Section 6.11 for further details related to the coding of the esposreq message.
The VPC shall include at most one civic and one geodetic location in the esposreq message. If the
VPC receives civic or geo-coded location information in the response from the ERDB, this
information will take precedence over civic or geo-location information included by the VPC in the
erdbRequest message. Specifically, if the VPC receives an msagvalidciviclocation parameter in the
erdbResponse message, it will use the msagvalidcivicaddress to populate the civic location
information in the esposreq message. If the VPC receives geo-coded location information in the
erdbResponse message, it will use the geo-coded location information to populate the position
information in the esposreq message along with the invalid civic address information. Otherwise,
the VPC will populate the civic and/or position information in the esposreq with the location
information included by the VPC in the erdbRequest message.
5.6.2.2.2 Error Responses
The VPC may be unable to provide location information in response to a request from the ALI
database due to the following conditions:
The VPC experiences a system failure resulting in the inability to look up the information;
The requesting entity is not authorized to access location data for emergency calls;
Unexpected data is received in the location request;
The ESQK identified in the request does not have any stored data associated with it;
A default ESQK was allocated to multiple call instances.
Page 89 of 247
The VPC shall authenticate the entities from which it receives queries to ensure that information is
only provided to those entities that are entitled to receive it.
The VPC may implement authorization policies to ensure that requesters only receive what they are
entitled to.
5.6.4
Performance
No normative performance requirements are specified in this document. Guidelines are provided in
Section 9.7.
5.6.5
The VPC application shall be highly reliable and available. It is an objective that the VPC be
available to a querying element (e.g., Call Server/Proxy, ALI Database) at a service availability level
of 99.999%.
5.7
This section provides the high-level functional requirements for the VDB. The main functions of the
VDB are to:
Store MSAG validation data (MSAG valid civic addresses) for a given area it is expected
that there will be multiple VDBs supported by the various entities and each contains a
mechanism to validate data to conform to the MSAG for the given jurisdiction.
Perform MSAG Validation of a Civic Address request.
The legally designated 9-1-1 authority for the jurisdiction may provide this service, or it may be
delegated to an authorized entity.
5.7.1
The VDB shall support civic address information as defined by local MSAG(s) for a given region.
All modification requests to data stored on the VDB shall be logged.
Page 90 of 247
Perform Validation
Page 91 of 247
15 All translations and searches done by the VDB to determine if an address is MSAG-valid must also be done by the ERDB when a
call is being routed. This means that all data managed by the VDB must also reside in the ERDB and that any translations or data
conversions done by the VDB must also be done by the ERDB.
Page 92 of 247
Performance
The VDB shall be available to support validation requests with an availability of 99.9%.
5.8
The LIS sits within or at the edge of the access network and invokes applicable positioning
technologies enabling consistent and reliable location information to be attributable to an answerable
source. It may support a simple request/response message that allows the VPC to obtain the location
of a client without the client user identity being required. It may allow clients to request their
location directly. The LIS must support at least one of the functions but it is recommended that the
LIS support both functions. The LIS supports a location information credentialing system that
provides assurances of the applicability, currency, and identity of the source of the location
Version 2, August 11, 2010
Page 93 of 247
5.8.1
The nature of the connection used by the client. That is, whether it is a residential broadband
connection, an enterprise IP switch connected client, a wireless client connecting via a
campus wireless LAN, a client connecting to a wide area broadband wireless connection, etc.
Legacy circumstances. That is, the extent to which the clients, access devices, and switches
have native support for location delivery versus the need to overlay a solution for location
determination on existing infrastructure.
The type of location information and accuracy required for a given target environment. For
example, are static civic addresses with sufficient geodetic accuracy for routing sufficient or
is a more accurate geodetic location required in the absence of a civic address?
Detailed LIS Requirements
The LIS is a critical component in the support of emergency services for VoIP. The location of the
caller is critical both in terms of routing the call to the correct PSAP and in terms of emergency
service dispatch to the emergency location. In providing location, however, there are a number of
important attributes that should be associated with both the location information and the manner in
which it is provided. These are summarized in the following list:
1. Where the client must be aware of the LIS, the LIS shall support consistent mechanisms by
which it can be "discovered" by client devices in the access network in order that location
information and location keys can be obtained.
2. When providing a client key or signed location, the LIS shall support an expiry mechanism
by which it will delete its record of a client device within an agreed period of time unless it is
renewed by the client 16.
3. The LIS shall support a mechanism by which location can be provided to a requesting client
device in the served access using a standardized and open protocol such that all clients can
assume a consistent mechanism.
4. Location shall be coded in a standardized fashion such that systems and devices which utilize
delivered location will be able to do so in a consistent fashion.
5. The location information shall be able to be provided with associated "credentials" to ensure
the applicability of the location to the device.
a. The credentials should reliably identify the source of the location (i.e. the LIS
operational identity).
b. The credentials should identify a unique client ID that the location is associated with.
c. The credentials should identify a specific time after which the location should no
longer be considered valid.
6. The LIS shall support a mechanism whereby a client-provided location can be augmented
with location credentials by the LIS if that client-provided location can be determined by the
16 There is currently limited Standards support for signing location but it is expected that more support will available by the time the
i2 solution is deployed.
Page 94 of 247
In order for nomadic devices to be able to obtain information reliably and transparently regardless of
the IP access network that they "roam" into, it is necessary that there be a consistent means of
discovering and communicating with the LIS functional entity within the access network. To support
roaming across national network boundaries, it should be possible for a single VoIP client
implementation to determine location information in the same way regardless of the access network.
To facilitate this requirement, it is recommended that LIS interaction be based on a specification
from a global standards body.
The necessary functions for the location acquisition and delivery protocol to support are as follows:
5.8.3
A discovery mechanism must be provided. This may be an explicit indication of the serving
LIS entity identity provided, for example, by DHCP or DNS. Optionally, a broadcast and
response message that allows a client device to find a LIS in the access network may be
supported.
A direct query to the LIS to provide location is recommended.
Validated Address to PIDF-LO Mapping
Table 5-5 below shows how data elements returned by the VDB would be mapped to PIDF-LO for
an emergency call. The validated data tag names shown are from the validateAddressResponse
Page 95 of 247
Validated Address
Element
PIDF-LO Element
HouseNum
HouseNumSuffix
PrefixDirectional
StreetName
PostDirectional
MSAGCommunity
PostalCommunity
StateProvince
CountyName
PostalZipCode
Country
Latitude
Longitude
Elevation
5.8.4
HNO
HNS
PRD
RD 17
POD
A3
PCN 18
A1
A2
PC
Country
gml:coordinates
gml:coordinates
gml:coordinates
The LIS, in the context of emergency services, must implement strong authentication mechanisms to
protect the private nature of the information it contains.
The LIS, in the context of emergency services, must implement strong authorization policies to
protect the private nature of the information it contains.
5.8.5
Performance
No normative performance requirements are specified in this document. Guidelines are provided in
Section 9.7.
5.8.6
Since the LIS may be involved during an emergency call, the LIS emergency application shall be
highly reliable and available. It is an objective that the LIS be available to a querying element (e.g.,
the VPC for LK de-referencing) at a service availability level of 99.999%.
17 RD is defined in RFC-5139 [37] which replaces A6 defined in RFC 4119 (PIDF-LO).
Page 96 of 247
This section provides additional functional requirements on the existing ALI DB that shall be
implemented in support of the i2 solution.
The ALI database shall be configured with the following information associated with the ESQK:
No incremental authentication and authorization requirements are specified for the ALI DB in this
document.
5.9.2
Performance
No incremental performance requirements are specified for the ALI DB in this document.
5.9.3
No incremental reliability and availability requirements are specified for the ALI DB in this
document.
Page 97 of 247
This section provides an overview of interfaces defined in this standard. This section is intended to
give the reader a better understanding of what role each of the interfaces provides and also to
provide the detailed specifications for the identified interfaces. Where applicable, XML schemas
associated with the specified interfaces can be found at the following location..
Each interface addresses a security mechanism to be used as part of the message exchange.
The XML schema associated with this interface can be found at the following location:
http://www.nena.org/technical-xml-schemas
6.1
The detailed specification of this interface is out of scope for this document.
The v0 interface is the name given to the interface by which an end-device is informed of its location
by an entity in the access network. At the time of writing, several mechanisms are in standard track
or have reached standard status for providing location to endpoints. These include, but are not
limited to:
1. Using DHCP to convey Geodetic information as defined in RFC 3825 [6]
2. Using DHCP to convey Civic information as defined in RFC 4776 [7].
3. Using LLDP-MED to convey Geodetic and/or Civic location as defined in ANSI/TIA-1057
[25].
4. Using HELD to request Geodetic and/or Civic location as defined in draft-ietf-geopriv-httplocation-delivery [26].
With some mechanisms, the client-device will need to make a request to the network to obtain
location information and format the information into a PIDF-LO. With others, the location will be
delivered to the end-device pre-formatted as a PIDF-LO.
The detailed specification of this interface is out of scope for this document. However, NENA
prepared a Technical Requirement Document (TRD) 08-752 [27] and a Technical Information
Document (TID) 08-505 [28] that addresses location determination and acquisition in the IP domain.
6.2
The v1 interface represents the link between the client-device and a CS. It is over this link the user
establishes a call, and conveys location information. Location conveyance in call establishment is
being developed in the wider VoIP community. At present the most advanced work is in the IETF
and deals with location conveyance over SIP, (draft-ietf-sipcore-location-conveyance [12]). It is a
recommendation of the i2 architecture that the v1 interface be capable of transporting either location
or location key information regardless of the protocol being used to support the voice service. If the
Page 98 of 247
This section describes the v2 interface between the VoIP CS/RP/RS and the VPC as shown in Figure
3-1. This interface provides a means for the CS/RP/RS to request emergency services routing
information from the VPC, and to inform the VPC, at call termination, when a routing/query key is
no longer required. The interface consists of four messages and these are introduced in subsequent
paragraphs. The v2 interface is XML-based.
The v2 interface is likely to need to operate in a variety of network environments, some trusted, and
some not. For this reason the HTTPS (HTTP [33] over TLS [22]) protocol using web services has
been selected as the transport mechanism for the v2 interface, as this provides strong security
mechanisms and is readily able to traverse enterprise and commercial firewalls when correctly
configured.
6.3.1
v2 Message Definitions
The v2 interface defines two sets of Request/Response messages (for a total of 4 messages). The first
message set requests and receives routing instructions. The second message set indicates that an
emergency call has concluded. The remainder of this Section details the 4 messages that make up
communication across the v2 interface.
6.3.1.1 Emergency Services Routing Request (esrRequest)
The esrRequest message is sent from the query node (CS/RP/RS) to the VPC to request routing
information and a query key. The valid parameters for the esrRequest message are included in the
following table.
Table 6-1 - esrRequest Parameters
Parameter
source
Condition
Mandatory
Vsp
Conditional
callId*
Mandatory
datetimestamp
Optional
callback*
Conditional
Description
The identifier of the node requesting
routing information directly from the
VPC.
The identifier of the caller's voice
service provider
Any identifier that can uniquely
identify the call globally.
Date Time Stamp indicating UTC date
and time that the message was sent
E.164 number that can be dialed by a
PSAP operator to reach the call
Page 99 of 247
Condition
Description
originator
The Location Information Element.
An ID inserted by the originating
network that allows LIS to validate if
the call is from the originating
network.
Vpc
Optional
The identifier of the destination VPC.
customer
Conditional
The subscriber/account name
associated with the callback number
* In some cases the <callback> number will uniquely identify the call at the CS. In such a case,
the <callId> parameter will contain the value of the <callback> number parameter. There is no
formal requirement for this to be the case however, and only the value contained in the
<callback> parameter shall be used to deliver the callback number over the v-E2 interface.
Lie
callOrigin
Mandatory
Optional
The <source> element identifies the node directly requesting emergency call routing from the VPC
over the v2 interface. It includes the source node (hostId), a NENA administered identifier (nenaId)
a 24x7 contact number (contact), and an optional uri URI (certUri) providing a link to the provider's
VESA issued certificate. The <source> must be a trusted entity of the VPC.
An example of how the <source> element is used, along with format definitions is as follows:
<source>
<organizationName>James's cool VSP</organizationName>
<hostId>cs34.example.com</hostId>
<nenaId>nena1</nenaId>
<contact>tel:17325551212/contact>
<certUri>https://cs34.example.com/certificate.crt</certUri>
</source>
The <organizationName> is a free form text field into which the node owner may place their
company name or other label. This field is optional.
The <hostId> identifies the fully qualified domain name or IP address of the directly requesting
node. This field is mandatory.
The <nenaId> is the NENA administered company identifier ((NENA Company ID 19) of the node
requesting routing information over the V2 interface. This field is optional.
The <contact> is a telephone number by which the directly requesting node operator can be reached
24 hours a day, 7 days a week. This field is mandatory.
19 Registered NENA Company IDs are not used outside the United States.
The <certUri> provides a means of directly obtaining the VESA issued certificate for the requesting
node. This field is optional.
The <vsp> element identifies the Voice Service Provider for the call. This element is used to identify
the original VoIP service provider, in cases where the original VSP is not the same entity as the one
requesting routing information over the v2 interface. In cases where the VoIP service provider and
the entity requesting routing information are not the same, the <source> element is used to identify
the entity requesting routing information over the v2 interface and the <vsp> element is used to
identify the voice service provider. The mechanisms used to determine the VSP at routing
proxy/redirect server are for further study.
<vsp>
<organizationName>Martin's super VSP</organizationName>
<hostId>cs34.example.com</hostId>
<nenaId>nena1</nenaId>
<contact>tel:398348975439823</contact>
<certUri>https://cs34.example.com/certificate.crt</certUri>
</vsp>
The <hostId> and <contact> elements must be provided. The <organizationName>, <nenaId> and
<certUri> fields are optional.
The <callId> element is an identifier that can be used to uniquely identify the call globally. If a
callId is received in SIP signaling, the Call Server shall use the received callId as the callId over the
v2 interface. If a callId is not received in incoming signaling, the call server/proxy shall follow the
recommended procedures as specified in RFC3261 for UA Call-ID generation.
An example of a callId received in SIP signaling:
<callId>3848276298220188511@atlanta.example.com</callId>.
The <callback> number is a tel-uri of the format tel: 1-212-555-8215. This identifies the E.164
number that can be dialed to reach the caller. This is the number that will be included in the callback
number field in the esposreq response message to the ALI.
<callback>tel:1-212-555-8215</callback>
The <lie> is the Location Information Element that contains location information that is used to
determine the routing and query keys to be used for the call. This parameter is mandatory, and if not
provided, the VPC must provide default routing or an error to the requesting node. If the <lie> is
present in the esrRequest, then it may contain a LocationKey, a PIDF-LO (geodetic and or Civic), or
both. The exact mechanism used to determine the routing and query keys is dependent on the
contents of the <lie>.
<lie>
<locationKey>3c01abe092@lis.example.com</locationKey>
<presence xmlns="urn:ietf:params:xml:ns:pidf"
xmlns:gp="urn:ietf:params:xml:ns:pidf:geopriv10"
xmlns:gml="urn:opengis:specification:gml:schema-xsd:feature:v3.0"
entity="3c01abe092@lis.example.com">
<tuple id="sg89ab">
<status>
<gp:geopriv>
<gp:location-info>
<gml:position>
<gml:Point gml:id="point1" srsName="epsg:4326">
<gml:pos>37.775 -122.422</gml:pos>
</gml:Point>
</gml:position>
<cl:civilAddress>
<cl:country>US</cl:country>
<cl:FLR>2</cl:FLR>
</cl:civilAddress>
</gp:location-info>
<gp:usage-rules>
</gp:usage-rules>
</gp:geopriv>
</status>
<timestamp>2003-06-22T20:57:29Z</timestamp>
</tuple>
</presence>
</lie>
The LIE example above shows both Geodetic Location and Civic address information, which is
acceptable, but in most cases it is expected that either Geodetic Location or Civic Location would be
sent in the LIE.
The <callOrigin> parameter is used by the VPC when it sends a LocationKey to the LIS over the v3
interface. The LIS is able to use this parameter to determine if the LocationKey received belongs to
the originating network. Use of this parameter is LIS implementation-specific and is subject to local
access network policy.
<callOrigin>accessNetwork.com</callOrigin>
The <datetimestamp> is the date time stamp in UTC time using ISO 8601 [44] format indicating the
time that the message was sent from the requesting node. This field is optional, but if not included,
then the VPC must maintain an accurate date and time stamp in any call event records so that an
audit trail is readily accessible.
<datetimestamp>2004-12-12T21:28:43Z</datetimestamp>
The <vpc> element identifies the VPC from which routing information is being requested.
Version 2, August 11, 2010
<vpc>
<organizationName>Specific VPC Service</organizationName>
<hostId>cs34.example.com</hostId>
<nenaId>nena1</nenaId>
<contact>tel:398348975439823</contact>
<certUri>https://cs34.example.com/certificate.crt</certUri>
</vpc>
The coding of the VPC element is the same as the coding for the source element.
The <customer> is an alphanumeric field that identifies the subscriber/account owner name
associated with the callback number in subscription data. The customer name will be included in the
<NAM> field of the Location Description parameter in the esposreq response message to the ALI.
<customer>Turin Turumbar</customer>
<esrRequest xmlns="urn:nena:xml:ns:es:v2"
xmlns:xsi=http://www.w3.org/2001/XMLSchema-instance
xsi:schemaLocation="urn:nena:xml:ns:es:v2 v2.xsd">
<vpc>
<organizationName>Specific VPC Service</organizationName>
<hostId>vpc.example.com</hostId>
</vpc>
<source>
<organizationName>Terry's redirect proxy</organizationName>
<hostId>rp34.example.com</hostId>
<nenaId>nena1</nenaId>
<contact>tel: 398348975439823</contact>
<certUri>https://rp34.example.com/certificate.crt</certUri>
</source>
<vsp>
<organizationName>Operator One's Call Server</organizationName>
<hostId>cs98.example.com</hostId>
<nenaId>nena2</nenaId>
<contact>tel:15554476632</contact>
<certUri>https://cs98.example.com/certificate.crt</certUri>
</vsp>
<callId>610239946019573</callId>
<callback>610239946019573</callback>
<lie>
<locationKey>3c01abe092@lis.example.com</locationKey>
<presence xmlns="urn:ietf:params:xml:ns:pidf"
xmlns:pidf="urn:ietf:params:xml:ns:pidf"
xmlns:gp="urn:ietf:params:xml:ns:pidf:geopriv10"
xmlns:gml="http://opengis.net/gml" entity="pres:user@example.com">
<tuple id="a6fea09">
<status>
<gp:geopriv>
<gp:location-info>
<gml:position>
<gml:Point gml:id="point1" srsName="epsg:4326">
<gml:pos>42.5463 -73.2512</gml:pos>
</gml:Point>
</gml:position>
</gp:location-info>
<gp:usage-rules>
</gp:usage-rules>
</gp:geopriv>
</status>
<timestamp>2004-12-01T09:28:43Z</timestamp>
</tuple>
</presence>
</lie>
<callOrigin>Some arbitrary string in here</callOrigin>
<datetimestamp>2004-12-12T21:28:43Z</datetimestamp>
<customer>Gomer Pyle</customer>
</esrRequest>
Parameter
Condition
Description
vpc
Mandatory
callId
Mandatory
esgwri
Conditional
ert
Conditional
selectiveRoutingID
Conditional
routingESN
Conditional
npa
Conditional
Conditional
esqk
Version 2, August 11, 2010
Parameter
Condition
Description
to uniquely identify the call within ESZ
lro
Conditional
Result
Mandatory
datetimestamp
Optional
destination
Optional
The <hosted>, <nenaId>, and <contact> fields are mandatory while the other fields of the <vpc>
element are optional.
The <destination> element identifies the node that directly requested emergency call routing
information from the VPC. It includes the source node (hostId), a NENA administered Company ID
identifier (nenaId), a 24x7 contact number (contact), and optional parameters for the organization's
name and URI (certUri) for the operator's VESA issued certificate. The <destination> must be a
trusted entity of the VPC.
<destination>
<organizationName>Generic Redirect Proxys</organizationName>
<hostId>rp34.example.com</hostId>
<nenaId>nena1</nenaId>
<contact>tel: 398348975439823</contact>
<certUri>https://rp34.example.com/certificate.crt</certUri>
</destination>
The <organizationName> is a free form text field into which the node owner may place their
company name or other label. This field is optional.
The <hostId> identifies the fully qualified domain name or IP address of the directly requesting
node. This field is mandatory.
The <nenaId> is the NENA administered company identifier (NENA Company ID). This field is
mandatory.
The <callId> is an identifier that uniquely identifies the call at the requesting node.
<callId>767673678674835784587</callId>
The <esgwri> is the translation of the ERT with ESGW-specific information provided by either the
VSP or ESGW operator directly. An <esgwri> may be provided if the VPC performs the ERT-toESGWRI translation and a corresponding <esqk> is provided. The ESGWRI format is as follows:
sip: 1 numberstring@esgwprovider.domain;user=phone where the numberstring is 10
The <esqk> element contains the ESQK allocated by the VPC. This key identifies an ESN for a
specific PSAP, as well as the call instance at the VPC. A valid value must be returned in this field
for the call to be successfully routed to the appropriate PSAP, and for location information to be
supplied from the VPC to the PSAP. An <esqk> must only be provided if a corresponding <esgwri>
or <ert> is also provided. The <esqk> is expected to be a 10-digit North American Numbering Plan
Number. More information on ESQKs can be found in Interim p-ANI Administration Guidelines
(Rev. December 5, 2005) [54].
<esqk>npanxxnnnn</esqk>
The <lro> element contains the last routing option and provides the routing node with a "last
chance" destination for the call. The LRO may contain the Contingency Routing Number (CRN),
which is a 24x7 PSAP emergency number, or it may contain a routing number associated with a
national or default call center. The service type will depend on the condition that resulted in the
providing of the LRO. Ultimately the usage of LRO routing data for call delivery will depend on
decisions made internally to the routing node. There may be occasions when the VPC only returns
an LRO. Examples of scenarios in which this may be the case include invalid or unavailable
location information, VPC resource limitations, or the invoking of local PSAP routing policies.
When primary routing options fail, and no LRO is provided, the routing node is required to provide
specific default handling, which may include dropping the call. The <lro> shall be expressed as a
URI.
<lro>tel: 1-npa-nxx-nnnn</lro>
The <result> element indicates to the routing node whether or not the VPC was able to provide
routing information and the means by which the routing data was determined, or if no routing
information could be provided, the source of the problem. This element therefore provides a means
by which the VSP can monitor the quality of the routing information provided by a VPC operator. A
complete list of valid <result> codes is detailed in
Table 6-3. The values of the code are expected to be sent in this element.
<result>200 SuccessGeodetic</result>
The <datetimestamp> is the date time stamp in UTC time using ISO 8601 [44] indicating the time
that the message was sent from the VPC. This field is optional, but if not included, then the routing
Value
200
201
Name
SuccessGeodetic
SuccessLISGeodetic
Description
VPC has successfully determined the routing
information based on geodetic information contained
in the initial esrRequest
VPC has successfully determined the routing
information based on geodetic information obtained
from the LIS.
202
SuccessCivic
203
SuccessLISCivic
400
LROBadLocation
401
LRONoLIS
402
LRONoLocation
403
LROBadMessage
404
LRONoAuthorization
405
ErrorBadLocation
406
ErrorNoLIS
407
ErrorNoLocation
Name
ErrorBadMessage
409
ErrorAuthorization
500
LRONoResource
501
LROGeneralError
502
ErrorNoResource
503
ErrorGeneral
Description
The esrRequest received by the VPC could not be
parsed or was malformed. VPC is unable to provide an
LRO for routing.
The requesting node's esrRequest message failed
authorization at the VPC. VPC is unable to provide an
LRO for routing.
VPC was unable to allocate an ESQK (or default
ESQK) due to failure, and an LRO is provided to
enable default routing.
A general error is encountered and the VPC provides a
LRO to enable default routing.
The VPC is unable to allocate an ESQK (or default
ESQK) due to failure, and no CRN was provided from
the ERDB. VPC is unable to provide an LRO for
routing.
Any error cause that is not listed above. VPC is unable
to provide an LRO for routing.
<esrResponse xmlns="urn:nena:xml:ns:es:v2"
xmlns:xsi=http://www.w3.org/2001/XMLSchema-instance
xsi:schemaLocation="urn:nena:xml:ns:es:v2 v2.xsd">
<result>200 SuccessGeodetic</result>
<vpc>
<organizationName>Specific VPC Service</organizationName>
<hostId>vpc.example.com</hostId>
<nenaId>nena1</nenaId>
<contact>tel: 398348975439823</contact>
<certUri>https://vpc.example.com/certificate.crt</certUri>
</vpc>
<destination>
<organizationName>James's Call-Server</organizationName>
<hostId>cs34.example.com</hostId>
<nenaId>nena1</nenaId>
<contact>tel: 398348975439823</contact>
<certUri>https://cs34.example.com/certificate.crt</certUri>
</destination>
<callId>610239946019573</callId>
<ert>
<selectiveRoutingID>CITYTX12NET</selectiveRoutingID>
<routingESN>00050</routingESN>
<npa>817</npa>
</ert>
<esqk>469327927621542</esqk>
<lro>tel: 160910920672398</lro>
<datetimestamp>2004-12-12T21:28:53Z</datetimestamp>
</esrResponse>
Parameter
source
Condition
Mandatory
esqk
esgw
Conditional
Conditional
Description
The identifier of the routing node
directly adjacent to the VPC
The ESQK to return to the VPC pool
The identifier of the ESGW used to
direct the call to the selective router
Page 111 of 247
Condition
Optional
callId
Mandatory
vpc
Optional
Description
Date Time Stamp indicating UTC date
and time that the message was sent
The identifier that uniquely identified
the call at the Call Server
The identifier of the VPC
The <source> element identifies the node directly requesting emergency call routing from the VPC.
It includes the source node (hostId), a 24x7 contact number (contact), as well as an optional NENA
administered company identifier (nenaId), and an optional uri (certUri) that provides a link to the
provider's VESA issued certificate. The <source> must be a trusted entity of the VPC.
The value of <hostId> element within <source> element must be identical within any set of
associated esrRequest and ESCT messages.
The format of the <source> element is shown below:
<source>
<organizationName>CS-2K</organizationName>
<hostId>cs34.example.com</hostId>
<nenaId>nena1</nenaId>
<contact>tel: 398348975439823</contact>
<certUri>https://cs34.example.com/certificate.crt</certUri>
</source
The <organizationName> element stores free form text field into which the node owner may place
their company name or other label. This field is optional.
The <hostId> identifies the fully qualified domain name or IP address of the directly requesting
node, this field is mandatory.
The <nenaId> element stores the NENA administered company identifier (NENA Company ID),
this field is optional.
The <contact> element stores a telephone number by which the directly requesting node operator
can be reached 24 hours a day, 7 days a week. This element is mandatory.
The <certUri> element provides a means of directly obtaining the VESA issued certificate for the
requesting node. This element is optional.
The <vpc> element identifies the VPC.
<vpc>
<organizationName>Specific VPC Service</organizationName>
<hostId>vpc34.example.com</hostId>
<nenaId>nena1</nenaId>
<contact>tel: 398348975439823</contact>
<certUri>https://vpc34.example.com/certificate.crt</certUri>
</vpc>
The <hostId> and the <contact> must be provided. The <nenaId>, <organizationName> and
<certUri> fields are optional.
The <esqk> element stores the ESQK that was allocated by the VPC for the call. This is the ESQK
that can now be returned to the pool of ESQKs available for use by the VPC.
<esqk>npa-nxx-nnnn</esqk>
The <esgw> element stores the identifier for the ESGW that was used to direct to the call to the
selective router. If an LRO was used to route the call then this element must not be present in the
ESCT message. The <esgw> is expected to be in the form of an IP address or a fully qualified
domain name.
<esgw>http://esgwprovider1.example.com</esgw>
The <callId> element stores the identifier that uniquely identifies the call at the querying node.
<callId>sips:123456789456123@cs34.example.com</callId>
Any <callId> values must be identical within any set of associated esrRequest and ESCT messages.
The <datetimestamp> element stores the date time stamp in UTC time using ISO 8601 [44] format
indicating the time that the message was sent from the routing node. This field is optional, but if not
included, then the VPC must maintain an accurate date and time stamp in any call event records so
that an audit trail is readily accessible.
<datetimestamp>2004-12-12T21:28:43Z</datetimestamp>
<esct xmlns="urn:nena:xml:ns:es:v2"
xmlns:xsi=http://www.w3.org/2001/XMLSchema-instance
xsi:schemaLocation="urn:nena:xml:ns:es:v2 v2.xsd">
<vpc>
<organizationName>Specific VPC Service</organizationName>
<hostId>vpc.example.com</hostId>
</vpc>
<source>
<organizationName>National Call-Servers</organizationName>
<hostId>cs34.example.com</hostId>
<nenaId>nena1</nenaId>
<contact>tel: 398348975439823</contact>
<certUri>https://cs34.example.com/certificate.crt</certUri>
</source>
<esgw>http://esgwprovider1.example.com</esgw>
<esqk>123456789456123</esqk>
<callId>sips:123456789456123@cs34.example.com</callId>
<datetimestamp>2004-12-14T09:44:39Z</datetimestamp>
</esct>
An esctAck message is sent from the VPC to the routing entity (CS/RP/RS) in response to an ESCT
message. If the Call Server does not receive an esctAck message after a specified time period, the
Call Server will log this event. The length of specified time period is an implementation detail. The
valid parameters for the esctAck message are contained in the following table.
Table 6-5 v2 esctAck Message Parameters
Parameter
callId
Condition
Mandatory
vpc
Datetimestamp
Mandatory
Optional
Description
Identifies the call at the
routing element
The identifier of the VPC
Date & Time Stamp
indicating UTC date and
time that the message was
sent
The <callId> element stores the identifier that uniquely identifies the call at the routing element.
<callId>sips:123456789456123@cs34.example.com</callId>
<vpc>
<organizationName>Specific VPC Service</organizationName>
<hostId>vpc34.example.com</hostId>
<nenaId>nena1</nenaId>
<contact>tel: 398348975439823</contact>
<certUri>https://vpc34.example.com/certificate.crt</certUri>
</vpc>
The <hostId> and <contact> must be provided. The <nenaId>, <organizationName> and
<certUri> fields are optional.
The <datetimestamp> parameter stores the date and time stamp in UTC time using ISO 8601 [44]
format indicating when the message was sent from the VPC. This field is optional, but if not
included, then the routing node must maintain an accurate date and time stamp in any call event
records so that an audit trail is readily accessible.
<datetimestamp>2004-12-12T21:28:43Z</datetimestamp>
6.3.2
Section 6.3.1 described in detail the 4 messages that make up communication across the v2 interface.
This section will describe the key call scenarios and show the message flows between the various
network elements.
6.3.2.1 v2 esrRequest contains valid Location
The following figure describes a typical call flow where a valid PIDF-LO document containing a
geodetic and/or civic location is provided by the LIS. The v2 messages are identified in bold red
Version 2, August 11, 2010
LIS
UA
CS
VPC
ESGW
1. PIDF-LO
2. Call Init
(PIDF-LO)
3. esrRequest (PIDF-LO,
customer, callback)
4. esrResponse (ert or
esgwri, esqk, lro)
5. Route Call
8. esctAck
1. The LIS provides a PIDF-LO containing geodetic and or civic information to the UA over
v0.
2. The UA initiates an emergency call to the CS over v1 and includes the PIDF-LO in the call
initiation message.
3. The CS determines the provisioned callback number and subscriber name associated with the
UA, and constructs an esrRequest message that includes a Call-ID, callback number,
subscriber name, and LIE containing the PIDF-LO. The CS sends the esrRequest message to
the VPC over v2.
4. The VPC receives the esrRequest from the CS and authenticates the CS. The VPC uses the
location contained in the PIDF-LO to obtain an ERT consisting of a Selective Routing
Identifier, routing ESN, and NPA, and a CRN from the ERDB (not shown). The VPC
5.
6.
7.
8.
allocates an ESQK based on the ERT. The VPC constructs an esrResponse message
containing the ESQK, LRO, and either the ESGWRI or the ERT, and returns this to the CS
over v2.
The CS uses the ESGWRI, if received in the routing response, to determine the correct
ESGW, or the CS determines the ESGW and appropriate ESGWRI value based on the ERT
received in the routing response message. The Call Server subsequently routes the call to the
ESGW over v4, and includes the ESGWRI, ESQK and callback number in outgoing
signaling.
The CS detects that call has concluded, and that the ESQK is no longer required.
The CS sends an ESCT message containing the ESQK, ESGW identifier and call ID to the
VPC.
The VPC accepts the ESCT message, authenticates the Call Server, returns the ESQK to the
pool of available keys, and notes the ESGW in its call event records. The VPC sends an
esctAck message to the Call Server.
LIS
UA
CS
VPC
PSTN
GW
1. PIDF-LO
2. Call Init
(PIDF-LO)
3. esrRequest (PIDF-LO,
customer, callback)
4. esrResponse (error)
5. Default Route
1. The LIS provides a PIDF-LO containing Civic address information to the UA over v0.
2. The UA initiates an emergency call to the CS over v1 and includes the PIDF-LO in the call
initiation message.
3. The CS determines the provisioned callback number and subscriber name associated with the
UA, and constructs an esrRequest message that includes a Call ID, callback number,
subscriber name, and a LIE containing the PIDF-LO. The CS sends the esrRequest message
to the VPC over v2.
v2 Interface Security
The v2 interface will need to operate in a variety of network environments, some trusted, and some
not, as described previously. The v2 interface is an XML-based interface and should be used with a
suitable security mechanism as defined in Section 4. When the connection between the routing entity
and the VPC is not on a trusted network, both the routing entity and VPC are expected to be
protected with IPsec or TLS, and thus require certificates rooted in VESA. Even in a trusted
network, TLS protection is advisable. The VPC is the server, and the routing entity is the client in
this interface. Mutual authentication is required when cryptographic security is deployed.
6.4
v3 VPC to LIS
NOTE: The v3 Interface protocol defined in Issue 1 of this Standard is being deprecated in
Issue 2 of this Standard in anticipation of NENA adopting an industry accepted mechanism to
provide the v3 functionality in a subsequent issue of this specification. The reasons for
deprecating the existing v3 interface definition include:
The existing v3 interface definition is not in line with current thinking on location
reference/dereference mechanisms and protocols.
This version of the i2 specification defines the v4 interface based on the SIP protocol. Other
protocols can be used provided they meet the requirements included in this document. The v4
interface, outlined within the current NENA i2 architecture, defines the communication protocol and
messaging between a CS or RP and the ESGW. This interface specification is intended to outline the
required data fields, with formats and examples, by which a CS or RP can properly assemble and
send data and also so that the ESGW knows what data format to expect, in order to further set-up
and facilitate the completion of an emergency voice call to the appropriate E9-1-1 network element.
The v4 interface provides the final leg of IP messaging into the existing TDM-based Emergency
Services Network. In the network implementation examples shown within this document, the v4
interface is always implemented between a SIP Proxy Server and an ESGW.
6.5.1
v4 Interface Architecture
With SIP, a variety of signaling paths leading up to the v4 interface may exist, including proxy
configurations which terminate the v4 interface. Because of this network variability, the v4 interface
may terminate to a 9-1-1 Call Server/Proxy, or any other (SIP) 9-1-1 Call Proxy. Despite other
variations which may exist in practice, this specification focuses on two basic scenarios which are
depicted below.
Emergency Services
Provider Network
IP domain
Routing Proxy
Call Server/
Proxy
v6
v4
ESGW(s)
v4
v1
VoIP
End
Point
E9-1-1
Selective
Router(s)
PSAP
v2
SRDB
v2
VPC
Scenario 1:
Version 2, August 11, 2010
The following call flow represented by a ladder diagram shows an emergency 9-1-1 call where the
CS queries the VPC to obtain necessary 9-1-1 call routing information and then uses the received
routing information to route the call to the ESGW. This messaging scenario is graphically depicted
in Figure 6-5. Messages which pertain to the V4 interface are shown in bold red. Also included is a
detailed call flow process description.
a 9-1-1 emergency call by sending a SIP INVITE message with 911 as the dialed number
and its media capabilities encapsulated in a SDP payload (denoted as SDP1), to the CS.
2. The CS responds back to the VEP with a SIP 100 Trying message.
v4 Message Parameters
Condition
Provider-ID
Mandatory
ESQK
Mandatory
ESGWRI
Mandatory
SIP Header
found in
Via
P-AssertedIdentity
Request-URI
Description
The identifier of the VoIP [Call]
Service provider (VSP). Other
Provider-IDs (e.g., Routing Proxy
or Redirect Server) may be
presented in additional Via
headers
Key allocated for the call for ALI
query.
Number used to direct the call to
Page 125 of 247
customer
Optional
NENA
propriety
Parameter in PAssertedIdentity
(CBN=)
P-assertedIdentity
Subscriber name
Condition
Mandatory
SIP Header
Via
Description
The identifier (IP Address or
FQDN) of the ESGW Service
provider
6.5.4
In network configurations using a standalone RS or a RP, an additional Via header may be present
identifying the intermediary element.
20 Although, in this example, both the From header and the P-Asserted-Identity header contain the callback number, it should be
noted that the content of the From header and the P-Asserted-Identity need not be the same. The From header is what was received
from the UA and the CBN is whatever the VSP puts in a PAI. The P-Asserted-Identity will include a URI parameter that contains the
callback number that the Call Server/Proxy determined to be associated with the emergency call, based on local procedures.
A Record-Route header must be inserted by each node involved in progressing the call to ensure
they remain in the dialog throughout the call.
6.5.4.3.1 v4 - ESGW SIP message handling:
When receiving a SIP INVITE, the ESGW shall extract the ESGWRI from the contact header and
identify the outgoing trunk group over which the emergency call will be delivered to the SR. If a
single 10-digit number is to be signaled over the outgoing trunk group, the ESGW shall extract the
number in the URI of the P-Asserted-Identity header (i.e., the ESQK) and send it over the trunk
interface to the Selective Router as the calling party number/ANI.
If the ESGW determines that two 10-digit numbers (i.e., ESQK + callback number) are to be
signaled to the SR, the ESGW shall extract the number in the URI of the P-Asserted Identity header
(i.e., the ESQK) and signal that number to the Selective Router in the Generic Digits Parameter or
Called Party Number. The ESGW shall extract the callback number from the URI parameter in the
P-Asserted-Identity header and signal that number to the Selective Router as the Calling Party
Number/ANI.
6.5.4.4 Identifying a call instance
Please refer to IETF RFC 3261 for more details on identifying call instances [5].
6.5.5
This section identifies what information is included in the headers exchanged in the SIP INVITE,
200 OK, and the SIP BYE messages over the v4 interface. The message sequence numbers refer to
steps identified in Figure 6-5.
Note: Location information (PIDF-LO) and credential information within the SIP messaging, as part
of a multipart MIME SIP message is retained. This means that parts can be used to authenticate,
inform, and direct, but these parts are not to be removed during the transference of SIP messaging.
The end result is that the v4 must support the inclusion of a PIDF-LO and associated credential
information within the subsequent SIP INVITE messages.
The following parameters have been used to construct the examples below:
Assumptions
1. The sip:uri user=token parameter has a token value equal to 'phone' to ensure existing gateway
support (the use of an alternative token value would likely require software changes in
various SIP based equipment).
2. The P-Asserted-Identity SIP header is used to specify the ESQK value, since the impact on
subsequent ESGW processing will be minimized.
3. Either ordering or qvalues (ref. RFC3261) will be used to distinguish execution priority of
multiple Contact headers.
4. The logging of the specific ESGW used for the call will be done within the VPC and conveyed
to the VPC using the 200 OK, then NOTIFY SIP messages.
5. The SIP 200 OK message from the ESGW will contain a Contact header, listing the IP address
or a valid URI of the ESGW utilized.
6.5.7
v4 Interface Security
The v4 interface will operate in a variety of network environments, some trusted, and some not, as
described previously. The v4 interface should be used with a suitable security mechanism as defined
in Section 4. When the connection between the CS or RP and the ESGW is not on a trusted network,
both the CS/RP and ESGW are expected to be protected with IPsec or TLS, and thus require
certificates rooted in VESA. Even in a trusted network, TLS protection is advisable. Mutual
authentication is required when cryptographic security is deployed.
6.6
The v5 interface defines the communication protocol and behaviors between the CS and a RS
function using SIP, in response to an INVITE for the purpose of routing. In addition, the RS will
subscribe to the CS to be notified upon call termination. This section also describes v2 interface
interactions between the RS and the VPC as the method used by the RS to obtain routing
information from the VPC functional element 21.
6.6.1
Technical Description
As shown in Figure 6-6, the v5 interface exists between the CS and a RS. It provides a means for the
CS to request further emergency service routing information over SIP while retaining final routing to
the appropriate ESGW. The RS receives an INVITE method from the CS and interacts with the VPC
via the v2 interface to gather emergency call parameters. The RS then formats a 300 or 302
Response back to the CS with the emergency call parameters that are subsequently used by the CS to
select the appropriate ESGW to route the call to.
21 Some implementations may aggregate the RS and the VPC into one physical component internalizing the v2 interface.
Emergency Services
Provider Network
IP domain
Redirect Server
Call Server/
Proxy
v5
ESGW(s)
E9-1-1
Selective
Router(s)
v4
PSAP
v1
v2
VoIP
End
Point
SRDB
VPC
6.6.2
The following call flow shows a 9-1-1 call where the CS forwards the call to a RS to obtain
necessary 9-1-1 call routing information and then uses the received routing information to route the
call to the ESGW. Messages which pertain to the v5 interface are shown in bold red.
VEP
CS
RS
ESGW
VPC
1. INVITE
(911; PIDF-LO;
callid1; SDP1)
2. 100 Trying
3. INVITE
(callid1; PIDF-LO; customer; callback; SDP1)
4. 100 Trying
5. esrRequest (PIDF-LO,
customer, callback)
6. esrResponse (ert or
esgwri, esqk, lro)
8. ACK
9. INVITE
(callid1; esgwri; esqk; callback; PIDF-LO; SDP1)
10. 100 Trying
11. SUBSCRIBE
(callId1; timer)
12. 200 OK SUBSCRIBE
13. NOTIFY
(callid1;state; time left)
14. 200 OK NOTIFY
20. ACK
22. BYE
23. 200 OK
24. 200 OK
25. NOTIFY
(callid1; state; time left=0)
26. 200 OK NOTIFY
27. esct
(esqk, esgw, callId1)
29. SUBSCRIBE
(callId1; timer=0)
Here is the detailed description of the procedure depicted in the figure above:
Version 2, August 11, 2010
SIP 300 response is used as an example. A SIP 302 response could also be used.
v5 Message Parameters
Condition
Mandatory
SIP Header
Via
PIDF-LO
Conditional*
MIME body
Description
CS entity requesting routing
instructions.
Source of the Location
Callback
Conditional*
P-AssertedIdentity
Customer
Conditional*
P-AssertedIdentity
* Sent if present
vsp The identity of the VoIP Service Provider (CS). This is included in the Via header as part of
the URI.
PIDF-LO If included, it contains information on the callers location used to construct the LIE.
The PIDF-LO is included as a body within the SIP INVITE.
callback The callback number, determined by the VSP CS from subscription data, will be included
as a parameter in the P-Asserted-Identity header and expressed as an E.164 dialable and routable
number.
Customer The subscriber name, determined by the VSP CS from subscription data, will be
included in a P-Asserted-Identity header. When included, the subscriber name is expected to be of
the form John Doe. Aliases, nicknames and the like are not allowed.
6.6.3.2 v5 SIP 300/302 response
The SIP 300 or SIP 302 message response is sent from the RS to the CS Proxy in response to a SIP
INVITE message.This message is constructed from the routing information provided by the VPC in
the v2 esrResponse message. A subset of valid parameters sourced from the v2 esrResponse for the
SIP 300/302 response is contained in Table 6-9.
Parameter
Provider-ID
Condition
Mandatory
SIP Header
Via
esqk
esgwri
Conditional
Conditional
PAI
Contact
Description
Redirect Server responding
to INVITE.
Key allocated for the call.
Routing indicator used to
direct the call to the ESGW.
This parameter will be
present if the ESGWRI is
determined by the VPC.
This parameter will be
omitted if the ERT
23 This table contains a subset of the elements received in the v5 SIP INVITE message. Only the elements reused in the v2 interface
are described in this table. The v5 INVITE message will include all mandatory parameters described in RFC 3261.
Condition
SIP Header
ert
Conditional
Contact
lro 24
Conditional
Contact
Description
parameter is present.
The routing tuple to be used
by the call server to
determine the ESGWRI. If
the ESGWRI is already
provided, then this field will
be omitted.
Contingency Routing
Number to be used for
fallback or returned for error
conditions (with no
ESGWRI or ERT/ESQK)
Two possible cases are supported. The first (a) is when the VPC returns an ESGWRI. The second
(b), is when the VPC returns an ERT.
a) Once the RS has received the ESQK, ESGWRI, and LRO from the VPC, it formats and
sends a SIP 300 or SIP 302 response. Most of the headers received in the INVITE are echoed
back and two Contact headers are added. The Contact headers should be ordered such that
the first header contains ESGWRI/ESQK information and the second one contains the LRO
(included only if SIP 300 is used) for fallback. A qvalue parameter shall be added to each
line to explicitly provide ordering.
Contact header (first line) this header is added to the 3XX response. It contains the
ESGWRI and a PAI, containing the ESQK, Contact: <ESGWRI>;? P-AssertedIdentity:<ESQK>; q=#
Contact header (second line) - it contains the LRO, e.g., Contact: <LRO>;q=#. The LRO is
used by the CS/RP for contingency routing.
b) Once the RS has received the ESQK, ERT, and LRO from the VPC, it formats and sends a
SIP 300 or SIP 302 response. Most of the headers received in the INVITE are echoed back
and two Contact headers are added. The Contact headers should be ordered such that the
first header contains ERT/ESQK information and the second one contains the LRO (included
only if SIP 300 is used) for fallback. A qvalue parameter shall be added to each line to
explicitly provide ordering.
Contact header (first line) this header is added to the 3XX response. It contains the ERT
and a PAI, containing the ESQK, e.g., Contact: CLLI.ESN.NPA@<CS-Provider-ID>?PAsserted-Identity:<ESQK>; q=#;
24
lro is not included when SIP 302 message is used since the SIP 302 message allows only one
Contact header.
Condition
Mandatory
Mandatory
SIP Header
Via
From
Package
Mandatory
Event
Timer
Manadatory
Expires
Description
The identifier of the RS.
RS URI and tag associated with the
subscription
Identify type of event being
subscribed to and the call-id value
associated with this subscription
On initial subscription this value is
set to the ESQK timeout value (8
hours).
Parameter
Provider-ID
URI-ID
Condition
Mandatory
Mandatory
SIP Header
Via
From
State
Mandatory
Subscription-
Description
Contains CS URI
URI of the caller sent in the From
header.
Status of the call is active.
Page 138 of 247
Condition
Dialog-content
SIP Header
State
Content-Type:
dialog-info
Description
Dialog package refer to call flow
examples. Provides the entity
(caller URI-ID), state=current value,
call-Id of this particular leg of the
call, and tag.
Condition
Mandatory
Mandatory
SIP Header
Via
From
State
Mandatory
SubscriptionState
Content-Type:
dialog-info
Dialog-content
Description
Contains CS URI
URI of the caller sent in the From
header. URI associated with ESQK
for the call.
Status of the subscription is active
Dialog package refer to call flow
examples. Provides the entity
(caller URI-ID), call-Id of this
particular leg of the call,
state=terminated, and tag.
Condition
Mandatory
Mandatory
SIP Header
Via
From
Package
Mandatory
Event
Timer
Manadatory
Expires
Description
The identifier of the RS.
RS URI and tag associated with the
subscription
Identify type of event being
subscribed to and the call-id value
associated with this subscription
0 indicates the subscription is over
Page 139 of 247
Parameter
Provider-ID
URI-ID
Condition
Mandatory
Mandatory
SIP Header
Via
From
Description
Contains CS URI
URI of the caller sent in the From
header. URI associated with ESQK
for the call.
Status of the call is active
State
Mandatory
Dialog-content
Mandatory
Length
Mandatory
SubscriptionState
Content-Type: No content
dialog-info
Content-Length 0 means no content
6.6.4
Note: The state of the call immediately after the subscription is active.
Note: The termination of the subscription for a particular call is signaled by setting the
Subscription-State header to Terminated.
6.6.5
This section identifies what information is included in the SIP headers exchanged between the CS
requesting emergency call routing instructions and RS. The message sequence numbers refer to steps
identified in Figure 6-7. Not all message examples are provided.
The following parameters have been used to construct the examples below:
Message 7a: RS responds to CS with a SIP 300 Multiple Choices message using ESGWRI
SIP/2.0 300 Multiple Choices
Via: SIP/2.0/TCP callServer@vsp.com;branch=z9hG4bKrandomstuff1
Record-Route: <sip:callserver@vsp.com;lr>
To: 911 <sips:911@vsp.com;user=phone>
From: Anonymous <sip:fhdoweww34@vsp.com>;tag=afrt4
Call-ID: 123456789@vsp.com
CSeq:2 INVITE
Contact: <sips:+17131112222@vsp.com?P-Asserted-Identity:=<sips:+17135114321@vsp.com;user=phone>?>
Contact: <sips:+1-8005553434@vsp.com;user=phone>
The ERT is constructed as CLLI.ESN.NPA where the CLLI is set to the destination SR; the ESN is
set to the ESN for the location; the NPA is set to an appropriate value for the trunk group to the SR.
Message 9: CS sends SIP INVITE to ESGW over v4 Interface
INVITE sips:+17131112222@esgwprovider.com SIP/2.0
Via: SIP/2.0/TCP callServer@vsp.com;branch=z9hG4bKrandomstuff1
Via: SIP/2.0/TCP rs-ua@rsprovider.com;branch= 12356sssss98 _
Record-Route: <sip:callserver@vsp.com;lr>
To: 911 <sip:911@vsp.com;user=phone>
From: Anonymous <sip:fhdoweww34@vsp.com>;tag=afrt4
P-Asserted-Identity:<sip:+17135114321@vsp.com;user=phone;CBN=7135551234>
Call-ID: 123456789@vsp.com
Accept: application/sdp
CSeq: 1 INVITE
Content-type: application/sdp
Content-Length: 234
(SDP not shown)
NOTE: The call server may send the redirect server several NOTIFY messages communicating state
changes of the dialog. The redirect server will ignore all notifications except the termination
notification.
NOTE: Termination can come from the VEP as well, same result.
Message 29: RS terminates the subscription
SUBSCRIBE callServer@vsp.com SIP/2.0
Via: SIP/2.0/TCP rs-ua@rsprovider.com;branchz9hG4bKrandomstuff3
Call-ID: hesdr39532@rsprovider.com
To: <sip:fhdoweww34@vsp.com>
From: rs-ua@rsprovider.com;tag=RS1234
Cseq: 12121 SUBSCRIBE
Event: dialog; call-id=123456789@vsp.com;from-tag=afrt4
Expires: 0
NOTE: If the CS sends a NOTIFY that indicates that the call is over, the CS can set the
Subscription-state value to terminated, and that closes the subscription, making it unnecessary for
the RS to send another SUBSCRIBE with expires=0.
6.6.6
v5 Security Requirements
The v5 interface will need to operate in a variety of network environments, some trusted, and some
not, as described previously. v5 is a SIP interface and should be used with a suitable security
mechanism as defined in Section 4. When the connection between the Call Server and the Redirect
Server is not a trusted network, both the Call Server and Redirect Server are expected to be protected
with IPSEC or TLS, and thus require a certificates rooted in VESA. Even in a trusted network, TLS
protection is advisable. Mutual authentication is required when cryptographic security is deployed.
6.7
The v6 interface is defined as a SIP interface from a CS to a 9-1-1 RP. This interface is used where
the CS desires to unconditionally route all emergency calls to an entity that will both determine the
route and forward the call to the correct ESGW. The CS does not need to remain in the call setup
path (it is however expected to remain in the end-to-end signaling path).
6.7.1
v6 Interface Architecture
As shown in Figure 6-8, this implementation of a VoIP emergency call network incorporates a 9-1-1
RP to which all emergency calls are forwarded. The v6 interface is the SIP messaging between the
CS and the RP. The RP then contacts the VPC (using the v2 interface) to obtain the ESGWRI or
ERT, and ESQK, and forwards the call to the appropriate ESGW. In the case when the ERT is
obtained from the VPC, the Routing Proxy is responsible for translating the ERT to the appropriate
ESGWRI and then forwarding the call with the ESGWRI to the correct ESGW..
Emergency Services
Provider Network
IP domain
Routing Proxy
Call Server/
Proxy
v6
v4
v1
VoIP
End
Point
ESGW(s)
E9-1-1
Selective
Router(s)
PSAP
v2
SRDB
VPC
6.7.2
The following call flow represents a typical 9-1-1 call where the CS utilizes a RP which has a
connection to a VPC. All necessary call information is passed to the Routing Proxy using a SIP
INVITE. After the proper route is determined by the VPC using the v2 interface, the RP routes the
call to the appropriate ESGW via the v4 interface. Messages which pertain to the v6 interface are
shown in bold red.
Here is the detailed description of the procedure depicted in the figure above:
Version 2, August 11, 2010
v6 Message Parameters
Parameter
Condition
SIP Header
vsp
Mandatory
Via
PIDF-LO
Conditional*
MIME body
callback
Conditional*
P-asserted-Identity
customer
Conditional*
* Sent if present.
P-asserted-Identity
Description
The identifier of the VoIP Service Provider
(VSP).
Source for the Location Information
Element.
E.164 number that can be dialed by a
PSAP operator to reach the call originator.
Subscriber name.
vsp The identity of the VoIP Service Provider (CS). This is included in the Via header as part of
the URI.
PIDF-LO If included, it contains information on the callers location used to construct the LIE.
The PIDF-LO is included as a body within the SIP INVITE.
Callback The callback number, determined by the VSP CS from subscription data, will be
included in the P-Asserted-Identity header and expressed as an E.164 dialable and routable number.
6.7.5
This section identifies information included in SIP headers exchanged between the CS and the
Routing Server. The message sequence numbers refer to steps identified in Figure 6-9. Not all
message examples are provided.
The following parameters have been used to construct the examples below:
6.7.6
v6 Interface Security
The v6 interface will need to operate in a variety of network environments, some trusted, and some
not as described in previously. V6 is a SIP interface and should be used with a suitable security
mechanism as defined in Section 4. When the connection between the Call Server and the Routing
Proxy Server is not a trusted network, both the Call Server and Routing Proxy Server are expected to
be protected with IPsec or TLS, and thus require a certificates rooted in VESA. Even in a trusted
network, TLS protection is advisable. Mutual authentication is required when cryptographic security
is deployed.
v6 Interface Assumptions
When a 9-1-1 Proxy Server control model implementation is used, the 9-1-1 ProxyServer will be
interconnected to the VPC via the v2 interface or the equivalent messaging set.
6.8
v7 LIS to VDB
This section describes the v7 interface between the LIS and the VDB. The LIS shall use this
capability to verify that an address is MSAG-valid, ensuring that civic addresses maintained in the
LIS are and remain routable in the legacy 9-1-1 infrastructure.
The v7 interface supports validation requests for one civic address at a time as records are added,
modified, or re-validated. In this case, the LIS shall use this protocol to send web service calls to the
appropriate VDB(s).
6.8.1
v7 Message Definitions
The v7 interface is made up of a query-response message pair. The first message is sent from the LIS
to the VDB requesting location information to be validated against the MSAG. The second message
is sent from the VDB to the LIS in response to this request. The remainder of this section details the
2 messages that make up communication across the v7 interface.
6.8.1.1 v7 Request for Address Validation (validateAddressRequest)
The validateAddressRequest message between a LIS and a VDB requests validation of a civic
address against the MSAG. The valid parameters for this message are included in the following
table.
Table 6-16 v7 validateAddressRequest Parameters
Parameter
MessageID
Condition
Optional
CustomerID
Optional
StreetAddress
StreetName
MSAGCommunity*
PostalCommunity*
StateProvince
Country
PrefixDirectional
StreetSuffix
Mandatory
Mandatory
Conditional
Conditional
Mandatory
Mandatory
Optional
Optional
PostDirectional
CountyName
Optional
Optional
Description
Optional parameter that the LIS may provide. If available
in the request, the value is echoed back in the response.
This value is optionally assigned by the VDB to the LIS
and represents a unique client for that VDB.
Data container for the civic address.
Name of the street without suffix and prefix.
Valid service community name as found in the MSAG.
Name of the community as found in the postal guide.
Name of the state (U.S.) or province/territories (Canada).
Country identifier as per ISO-3166-1.
Leading street direction suffix (NSEW).
Valid street abbreviation as defined in the postal guide
(e.g., AVE).
Trailing street direction suffix (N,S,E,W).
Name of the county.
Page 158 of 247
Condition
Optional
PostalCode
HouseNum
HouseNumSuffix
Optional
Optional
Optional
Description
County identification code (usually the FIPS code for the
U.S.).
Postal code as per postal guide.
Civic number.
Civic number extension (e.g. 1/2, A).
The <CustomerID> element contains an identifier that a VDB operator has assigned to uniquely
identify a client. If available, the LIS should provide it in the request. This parameter is optional and
the format is as follows:
<CustomerID>character string</CustomerID>
The <StreetAddress> element contains sub-elements defining the civic address. The format is as
follows:
<StreeAddress>
<HouseNum>civic number</HouseNum>
<HouseNumSuffix>number suffix</HouseNumSuffix>
<PrefixDirectional>direction</PrefixDirectional>
<StreetName>name of the street</StreetName>
<StreetSuffix>suffix</StreetSuffix>
<PostDirectional>direction</PostDirectional>
<PostalCommunity>postal name of cummunity</PostalCommunity>
<MSAGCommunity>MSAG community name</MSAGCommunity>
<CountyName>name of the county</CountyName>
<CountyID>FIPS code</CountyID>
<StateProvince>state or province code</StateProvince>
<PostalCode>zip or postal code</PostalCode>
<Country>country code</Country>
</StreetAddress>
<validateAddressRequest xmlns=urn:nena:xml:ns:es:V7>
<MessageID>78801FA048D4226E4787F955</MessageID>
<CustomerID>vdbprovider24769854</CustomerID>
<StreetAddress>
<StreetName>LAVACA</StreetName>
<PostalCommunity>AUSTIN</PostalCommunity>
<StateProvince>TX</StateProvince>
<Country>US</Country>
</StreetAddress>
</validateAddressRequest>
Parameter
MessageID
Condition
Optional
ReturnCode
Mandatory
Valid
Mandatory
AddressList
Conditional
Description
Parameter that the LIS may provide. If available in the
request, the value is echoed back in the response.
Code defining the outcome of the request. See Table
6-18 for the defined values.
Defines whether the requested address yielded an
MSAG-valid address. Values are Valid, Invalid and
na.
Container for the list of addresses the VDB was able to
select based on the available address criterion.
The <MessageID> element uniquely identifies the request at the originating node and may be
provided by the LIS. If so, the VDB will echo it back in the response. The format is as follows:
<MessageID>character string</MessageID>
Any <AddressList> elements present, contain one civic address, along with an optional
corresponding geodetic position. Multiple <AddressList> elements, if present, have an ordered
sequence, from best match to worst match. The format is as follows:
<AddressList>
<Civic>
<HouseNum>civic number</HouseNum>
<HouseNumSuffix>number suffix</HouseNumSuffix>
<PrefixDirectional>direction</PrefixDirectional>
<StreetName>name of the street</StreetName>
<StreetSuffix>street suffix</StreetSuffix>
<PostDirectional>direction</PostDirectional>
<PostalCommunity>postal name of cummunity</PostalCommunity>
<MSAGCommunity>MSAG community name</MSAGCommunity>
<CountyName>name of the county</CountyName>
<CountyID>FIPS code</CountyID>
<StateProvince>state or province code</StateProvince>
<PostalCode>zip or postal code</PostalCode>
<Country>country code</Country>
</Civic>
<GeoPosition>
<Latitude>latitude</Latitude>
<Longitude>longitude</Longitude>
<Elevation>elevation<Elevation>
</GeoPosition>
</AddressList>
<AddressList>
<Civic>
...
</Civic>
..<GeoPosition>
...
</Geoposition>
</AddressList>
When the Return Code 210 = Success Address Translated (location is MSAG-valid but address
was modified) is supplied, the VDB shall include the modified information in the response message.
For example, if submitted AV is changed to AVE in order to validate, or if John Carpenter Freeway
is submitted and changed to Hwy 144, the modified value is used in the StreetAddress included in
the AddressList of the response message.
Return Code
Description
200
210
500
551
552
553
554
555
556
558
559
560
561
562
570
580
<validateAddressResponse xmlns=urn:nena:xml:ns:es:V7>
<MessageID>78801FA048D4226E4787F955</MessageID>
<ReturnCode>200</ReturnCode>
<Valid>valid</Valid>
<AddressList>
<Civic>
<HouseNum>700</HouseNum>
<StreetName>LAVACA</StreetName>
<StreetSuffix>ST</StreetSuffix>
<PostalCommunity>AUSTIN</PostalCommunity>
<MSAGCommunity>AUSTIN</MSAGCommunity>
<CountyName>TRAVIS</CountyName>
<CountyID>453</CountyID>
<StateProvince>TX</StateProvince>
<PostalCode>78701</PostalCode>
<Country>US</Country>
</Civic>
<GeoPosition>
<Latitude>30.270339</Latitude>
<Longitude>-97.745044<Longitude>
<Elevation>100<Elevation>
</GeoPosition>
</AddressList>
</validateAddressResponse>
<validateAddressResponse xmlns=urn:nena:xml:ns:es:V7>
<MessageID>78801FA048D4226E4787F955</MessageID>
<ReturnCode>210</ReturnCode>
<Valid>valid</Valid>
<AddressList>
<Civic>
<HouseNum>700</HouseNum>
<StreetName>LAVACA</StreetName>
<StreetSuffix>ST</StreetSuffix>
<PostalCommunity>AUSTIN</PostalCommunity>
<MSAGCommunity>AUSTIN</MSAGCommunity>
<CountyName>TRAVIS</CountyName>
<CountyID>453</CountyID>
<StateProvince>TX</StateProvince>
<PostalCode>78701</PostalCode>
<Country>US</Country>
</Civic>
<GeoPosition>
<Latitude>30.270339</Latitude>
<Longitude>-97.745044<Longitude>
<Elevation>100<Elevation>
</GeoPosition>
</AddressList>
</validateAddressResponse>
Here is an unsuccessful validation response example for a single address where the VDB couldnt
validate against a unique MSAG entry. The VDB returns alternate addresses.
<validateAddressResponse xmlns=urn:nena:xml:ns:es:V7>
<MessageID>78801FA048D4226E4787F955</MessageID>
<ReturnCode>559</ReturnCode>
<Valid>invalid</Valid>
<AddressList>
<Civic>
<HouseNum>700</HouseNum>
<StreetName>LAVACA</StreetName>
<StreetSuffix>ST</StreetSuffix>
<PostalCommunity>AUSTIN</PostalCommunity>
<MSAGCommunity>AUSTIN</MSAGCommunity>
<CountyName>TRAVIS</CountyName>
<CountyID>453</CountyID>
<StateProvince>TX</StateProvince>
<PostalCode>78701</PostalCode>
<Country>US</Country>
</Civic>
<GeoPosition>
<Latitude>30.270339</Latitude>
<Longitude>-97.745044<Longitude>
<Elevation>100<Elevation>
</GeoPosition>
</AddressList>
<AddressList>
<Civic>
<HouseNum>700</HouseNum>
<StreetName>LAVACA</StreetName>
<StreetSuffix>ST</StreetSuffix>
<PostalCommunity>HOUSTON</PostalCommunity>
<MSAGCommunity>HOUSTON</MSAGCommunity>
<CountyName>HARRIS</CountyName>
<CountyID>201</CountyID>
<StateProvince>TX</StateProvince>
<PostalCode>78701</PostalCode>
<Country>US</Country>
</Civic>
<GeoPosition>
<Latitude>29.719692</Latitude>
<Longitude>-95.275822</Longitude>
<Elevation>5<Elevation>
</GeoPosition>
</AddressList>
</validateAddressResponse>
6.8.2
Here is the detailed description of the procedure depicted in the figure above:
1. Locations of broadband connections are loaded into the LIS 26. The civic locations may be
postal-formatted.
2. If the serving VDB is not already known, the LIS issues an identityRequest message to the
RDS to discover the serving VDB for the location it manages. It is assumed that the LIS is
authenticated with the RDS.
3. The RDS searches its own database for corresponding records based on the provided
location. It then constructs an identityResponse message back to the LIS containing the
serving VDB URI(s).
Here is the detailed description of the procedure depicted in the figure above:
v7 Interface Security
The v7 interface will need to operate in a variety of network environments, some trusted, and some
not. The v7 interface should be used with a suitable security mechanism as defined in Section 4.
When the connection between the LIS and the VDB is not a trusted network, both the LIS and the
VDB are expected to be protected with IPsec or TLS, and thus require a certificates rooted in VESA.
Even in a trusted network, TLS protection is advisable. Mutual authentication is required when
cryptographic security is deployed. This provides strong security mechanisms and is readily able to
traverse enterprise and commercial firewalls when correctly configured. The LIS is expected to be a
VESA-certified entity, and the configuration of the LIS should be such that it uses a server-side
VESA certificate that is presented to the VDB on session establishment. This allows the VDB to
validate the LIS credentials before agreeing to accept and provide location information. The VDB
may use this information for billing or other purposes.
6.9
The v8 interface, in the context of the i2 architecture, defines the communication protocol and
messaging between a VPC and an ERDB, or between ERDBs 28. The ERDB is the entity that stores
the boundary information for emergency service zones. The ERDB should be able to accept queries
27 This interface is out of scope for this document.
28 The ERDB steering mechanism is only partially defined in this version of the document.
v8 Message Definition
A Request/Response message pair is defined here to allow a VPC to send a routing query to an
ERDB that contains information describing the emergency callers location (or to allow an ERDB to
forward a routing query received from a VPC to another ERDB), and to support the return of the
associated routing information by the ERDB. XML messages are used to support this information
exchange, with tags utilized for conveying civic and geodetic information to the ERDB.
6.9.1.1 v8 erdbRequest Request Routing Information
For the query, the erdbRequest is expected to contain geographical coordinates, civic address
information or both civic and geodetic location information. The erdbRequest will be sent to an
ERDB identified via the Root Discovery process (Section 3.9 describes the Root Discovery process).
The location information provided to the ERDB in the query is derived from the LO obtained by the
VPC.
Table 6-19 - erdbRequest Parameters
Parameter
messageId
Condition
Mandatory
source
Mandatory
vpc
Conditional
location
Conditional
geolocation
*Conditional
civiclocation
*Conditional
datetimestamp
Optional
destination
Optional
Description
This parameter uniquely identifies the query
at the VPC
Identifies the node directly requesting routing
information from the ERDB
Identifies the VPC that originally requested
the routing information
If present, contains one or both of the
following elements:
WGS84 coordinates derived from LO
Validated address passed in LO. This is
constructed from civic location information
received in the PIDF-LO
The datetimestamp parameter carries the date
and time of the message generation described
using UTC
Identifies the ERDB from which routing
information is being requested
Page 170 of 247
The <source> element identifies the node directly requesting emergency call routing information
from the ERDB over the v8 interface. It includes the source node (hostId), a NENA administered
identifier (nenaId), a 24x7 contact number (contact), and an optional uri (certUri), a link to the
provider's VESA issued certificate. The <source> must be a trusted entity of the ERDB.
The format must be as follows:
<source>
<organizationName>Noname VPC</organizationName>
<hostId>cs34.example.com</hostId>
<nenaId>nena1</nenaId>
<contact>tel:+398348975439823</contact>
<certUri>https://vpc34.example.com/certificate.crt</certUri>
</source>
The <hostid> and <contact> fields are mandatory while all the other fields of the <source>
element are optional.
The <vpc> element identifies the VPC that is requesting the routing information from the ERDB. In
cases where the routing request is steered from one ERDB to another, the <vpc> element would
identify the VPC requesting the routing information whereas the <source> element would identify
the ERDB that is steering the request. The format must be as follows:
<vpc>
<organizationName>Specific VPC Service</organizationName>
<hostId>vpc.example.com</hostId>
<nenaId>NENA911</nenaId>
<contact>tel:+398348975439823</contact>
<certUri>https://vpc.example.com/certificate.crt</certUri>
</vpc>
The <hostId> and <contact> fields are mandatory while all the other fields of the <source>
element are optional.
The <location> element contains the actual physical location of the VEP. It may be expressed as a
geodetic location, a civic address, or both formats of the same physical location.
Version 2, August 11, 2010
civiclocation The civiclocation element uses NENA-defined data elements. This is constructed
from elements of the PIDF-LO. This must be the Civic Address that was used for ERDB discovery.
It is assumed that this address was previously validated at the VDB. The format must be as follows:
<location>
<civiclocation>
<HouseNum>700</HouseNum>
<PrefixDirectional>N</PrefixDirectional>
<StreetName>LAVACA</StreetName>
<StreetSuffix>ST</StreetSuffix>
<MSAGCommunity>AUSTIN</MSAGCommunity>
<CountyName>TRAVIS</CountyName>
<StateProvince>TX</StateProvince>
<PostalCode>78701</PostalCode>
<Country>US</Country>
</civiclocation>
</location>
The <datetimestamp> parameter carries the date and time of the message generation described using
ISO 8601 [44] UTC format.
<datetimestamp>2001-12-17T09:30:47Z</datetimestamp>
The <destination> element identifies the ERDB from which routing information is being requested.
It includes the source node (hostId), a 24x7 contact number (contact), and optional parameters for
the organization's name and uri (certUri) for the operator's VESA issued certificate, and a NENA
administered identifier (nenaId). The <destination> must be a trusted entity of the VPC/ERDB.
The format must be as follows:
<destination>
<organizationName>ERDB Provider</organizationName>
<hostId>erdb34.example.com</hostId>
<nenaId>nena1</nenaId>
<contact>tel: 398348975439823</contact>
<certUri>https://erdb.example.com/certificate.crt</certUri>
</destination>
<erdbRequest xmlns="urn:nena:xml:ns:es:v8"
xmlns:alins=http://www.nena9-1-1.org/schemas/2003/ali
xmlns:gml=http://www.opengis.net/gml
xmlns:gs=http://www.opengis.net/pidflo/1.0"
xmlns:xsi=http://www.w3.org/2001/XMLSchema-instance
xsi:schemaLocation="urn:nena:xml:ns:es:v8 v8.xsd">
<messageId>78801FA048D4226E4787F955</messageId>
<source>
<organizationName>Vern's Virtual VPC</organizationName>
<hostId>cs34.example.com</hostId>
<nenaId>nena1</nenaId>
<contact>tel: 398348975439823</contact>
<certUri>https:\\rp34.example.com/certificate.crt</certUri>
</source>
<location>
<civiclocation>
<HouseNum>700</HouseNum>
<PrefixDirectional>N</PrefixDirectional>
<StreetName>LAVACA</StreetName>
<StreetSuffix>ST</StreetSuffix>
<MSAGCommunity>AUSTIN</MSAGCommunity>
<CountyName>TRAVIS</CountyName>
<StateProvince>TX</StateProvince>
<PostalCode>78701</PostalCode>
<Country>US</Country>
</civiclocation>
<gml:Point srsName="urn:ogc:def:crs:EPSG:6.6:4326">
<gml:pos>37.775 -122.4194</gml:pos>
</gml:Point>
</location>
<datetimestamp>2001-12-17 09:30:47.0Z</datetimestamp>
<destination>
<organizationName>Earl's Excellent ERDB</organizationName>
<hostId>cs47.example.com</hostId>
<nenaId>nena3</nenaId>
<contact>tel: 398348975439822</contact>
<certUri>https:\\cs47.example.com/certificate.crt</certUri>
</destination>
</erdbRequest>
Parameter
messageId
source
Condition
Mandatory
Mandatory
erdb
Conditional
ert
Conditional
selectiveRoutingID Conditional
routingESN Conditional
npa Conditional
adminesn
Conditional
crn
Conditional
msagvalidcivicaddress Conditional
geocodedlocation
Conditional
result
Mandatory
Description
Uniquely identifies the query at the VPC
The identifier of the node directly
responding to the routing query over the v8
interface
The identifier of the ERDB that is the
original source of the routing information
A routing identifier comprising the
following 3 elements:
The Common Language Location Indicator
(CLLI) code associated with the Selective
Router to which the emergency call is to be
directed.
The Emergency Services Number associated
with a particular ESZ that respresents a
unique combination of Police, Fire and EMS
emergency responders.
The primary Numbering Plan Area (NPA)
associated with the outgoing route to the
Selective Router that is appropriate for
callers location.
destination
Condition
Optional
Optional
Description
The datetimestamp parameter carries the
date and time of the message generation
described using UTC
The identifier of the node requesting the
routing information
The <messageID> parameter uniquely identifies the query at the VPC. The format is up to 32
characters, expressed as follows:
<messageId>78801FA048D4226E4787F955</messageId>
The <source> element identifies the node directly responding with emergency call routing
information over the v8 interface. It includes the source node (hostId), a 24x7 contact number
(contact), and an optional uri (certUri) and an optional NENA administered identifier (nenaId) to
provide a link to the provider's VESA issued certificate.
The format must be as follows:
<source>
<organizationName>Noname ERDB</organizationName>
<hostId>erdb34.example.com</hostId>
<nenaId>nena1</nenaId>
<contact>tel: 398348975439823</contact>
<certUri>https://erdb34.example.com/certificate.crt</certUri>
</source>
The <erdb> element identifies the node that is the source of the routing information. In some cases
the <erdb> element will be coded with the same information as the source element. In cases where
ERDB steering occurs, the <erdb> element will be coded with the identity of the ERDB from which
the routing information was obtained. It includes the source node (hostId), a 24x7 contact number
(contact), an optional NENA administered identifier (nenaId), and an optional uri (certUri) that
provides a link to the provider's VESA issued certificate. The format must be as follows:
<erdb>
<organizationName>No Name 1 ERDB</organization name>
<hostId>erdb1.example.com</hostId>
<nenaId>NENA911</nenaId>
<contact>tel:+398348975439823</contact>
<certUri>https://erdb1.example.com/certificate.crt</certUri>
</erdb>
The <ert> element is composed of a <selectiveRoutingID> tag, a <routingESN> tag and a <npa>
tag which are used to derive the appropriate ESGWRI.
The <selectiveRoutingId> contains the CLLI code of the selective router to which the call is being
routed. The CLLI code is an 11 character alphanumeric field of the form AAAABBCCDDD, where
AAAA represents the city/county
BB represents the State
CC represents the building or location
DDD represents the network.
The <selectiveRoutingID> must be provided if a <routingESN> and <npa> are provided.
The <routingESN> is a 3- to 5-digit field that uniquely identifies the ESZ in the context of an SR,
and the associated Police, Fire, and EMS emergency responders associated with that ESZ. The
<routingESN> must be provided if a <selectiveRoutingID> and <npa> are provided.
The <npa> is a 3 digit field that identifies the primary NPA associated with an outgoing trunk group
to the appropriate SR associated with the callers location. The <npa> must be provided if a
<selectiveRoutingId> and <routingESN> are provided.
<ert>
<selectiveRoutingID>AAAABBCCDDD</selectiveRoutingID>
<routingESN>nnnnn</routingESN>
<npa>NPA</npa>
</ert>
The <adminESN> parameter is coded with the administrative ESN that is associated with the
location information that is received in the query, when this information is available. It is associated
with a particular set of English Language Translations for an ESZ in a PSAP that are stored by the
ALI Database.
<adminesn>12345</adminesn>
The <msagvalidcivicaddress> parameter carries the MSAG-valid formatted civic address provided
by the ERDB. As previously described, the ERDB is expected to convert a received civic address
into an MSAG valid format that can be presented at the PSAP. This parameter is expected to be sent
only if a civic location is received in the erdbRequest message. The format must be as follows:
<msagvalidcivicaddress>
<HouseNum>700</HouseNum>
<HouseNumSuffix>1/2</HouseNumSuffix>
<PrefixDirectional>N</PrefixDirectional>
<StreetName>LAVACA</StreetName>
<StreetSuffix>ST</StreetSuffix>
<PostDirectional>SW</PostDirectional>
<MSAGCommunity>AUSTIN</MSAGCommunity>
<PostalCommunity>AUSTIN</PostalCommunity>
<CountyName>TRAVIS</CountyName>
<CountyID>453</CountyID>
<StateProvince>TX</StateProvince>
<PostalCode>78701</PostalCode>
<Country>US</Country>
</msagvalidcivicaddress>
The <geocodedlocation> parameter carries the geo-coded location information derived by the
ERDB if geodetic default routing was applied to the emergency call. This parameter is expected to
be sent only if civic location information is received in the ERDBRequest message and is found to
be invalid, the ERDB determines that default routing procedures must be invoked, and the PSAP
Authority has authorized the use of geodetic default routing. The format must be as follows:
<geocodedlocation>
<gml:Point srsName="urn:ogc:def:crs:EPSG:6.6:4326">
<gml:pos>37.775 -122.4194</gml:pos>
</gml:Point>
</geocodedlocation>
The <result> parameter carries an indication of whether the ERDB was able to provide routing
information and the means by which routing information was determined. If no routing information
was provided, this parameter could be used to determine the cause of the problem. Table 6-21 Result Codes lists and describes the codes that should be used.
<datetimestamp> The <datetimestamp> parameter carries the date and time of the message
generation described using ISO 8601 [44] UTC format.
<datetimestamp>2001-12-17T09:30:47Z</datetimestamp>
The <destination> element identifies the node that directly requested emergency call routing
information. It includes the source node (hostId), a 24x7 contact number (contact), and optional
parameters for the organization's name and uri (certUri) for the operator's VESA issued certificate.
The <destination> must be a trusted entity of the VPC/ERDB.
The format must be as follows:
<destination>
<organizationName>vpc Provider</organizationName>
<hostId>vpc.example.com</hostId>
<nenaId>nena1</nenaId>
<contact>tel: 398348975439823</contact>
<certUri>https://vpc.example.com/certificate.crt</certUri>
</destination>
Value
200
Name
SuccessGeodetic
201
SuccessCivic
210
211
212
Description
This value indicates that the ERDB was successful in
determining routing information using the received
Geo Location information
This value indicates that the ERDB was successful in
determining routing information using the received
Civic Location information
This value indicates that the ERDB was unable to
provide routing based on the civic location provided
but was able to successfully geocode the complete
location yielding a default route based on geocoded
information.
This value indicates that the ERDB was unable to
match an exact tabular MSAG-location based on the
civic location provided but was successful in
determining a default route based on the combination
of Postal Zone, Community name, County and State.
This value indicates that the ERDB was unable to
Name
County, State
213
214
215
400
ErrorBadLocation
401
ErrorNoLocation
403
ErrorBadMessage
404
ErrorAuthorization
500
ErrorGeneral
562
Out of Area
Description
match an exact tabular MSAG-location based on the
civic location provided but was successful in
determining a default route based on the combination
of Postal Zone, County and State.
This value indicates that the ERDB was unable to
match an exact tabular MSAG-location based on the
civic location provided but was successful in
determining a default route based on the combination
of Community name, County and State.
This value indicates that the ERDB was unable to
match an exact tabular MSAG-location based on the
civic location provided but was successful in
determining a default route based on the combination
of County and State.
This value indicates that the ERDB was unable to
match an exact tabular MSAG-location based on the
civic location provided but was successful in
determining a default route based on the State.
This value indicates that the ERDB was unable to
provide routing information because the received
location information was bad
This value indicates that the ERDB was unable to
provide routing information because the no location
information was received in the query
This value indicates that routing information was not
provided because the query received was corrupted
This value indicates that routing information was not
provided because the query failed authentication
This value indicates that a general error occurred and
the ERDB is unable to return routing information
This value indicates that the ERDB cannot process the
request as the address provided falls ouside its serving
area.
<erdbResponse xmlns="urn:nena:xml:ns:es:v8"
xmlns:alins=http://www.nena9-1-1.org/schemas/2003/ali
xmlns:gml=http://www.opengis.net/gml
xmlns:gs=http://www.opengis.net/pidflo/1.0"
xmlns:xsi=http://www.w3.org/2001/XMLSchema-instance
xsi:schemaLocation="urn:nena:xml:ns:es:v8 v8.xsd">
<messageId>78801FA048D4226E4787F955</messageId>
<source>
<organizationName>Earl's Excellent ERDB</organizationName>
<hostId>cs47.example.com</hostId>
<nenaId>nena3</nenaId>
<contact>tel: 398348975439822</contact>
<certUri>https:\\cs47.example.com/certificate.crt</certUri>
</source>
<ert>
<selectiveRoutingID>CITYTX12NET</selectiveRoutingID>
<routingESN>00005</routingESN>
<npa>512</npa>
</ert>
<adminesn>00000</adminesn>
<crn>5129987777</crn>
<msagvalidcivicaddress>
<HouseNum>700</HouseNum>
<StreetName>LAVACA ST</StreetName>
<MSAGCommunity>AUSTIN</MSAGCommunity>
<CountyName>TRAVIS</CountyName>
<StateProvince>TX</StateProvince>
<PostalCode>78701</PostalCode>
<Country>US</Country>
</msagvalidcivicaddress>
<result>200</result>
<datetimestamp>2001-12-17T09:30:47.0Z</datetimestamp>
<destination>
<organizationName>Vern's Virtual VPC</organizationName>
<hostId>cs34.example.com</hostId>
<nenaId>nena1</nenaId>
<contact>tel: 398348975439823</contact>
<certUri>https:\\rp34.example.com/certificate.crt</certUri>
</destination>
</erdbResponse>
6.9.2
Section 6.9.1 describes in detail the two messages that make up communication across the v8
interface. This section will describe the key call scenarios and show the message flows between the
various network elements.
Here is the detailed description of the procedure depicted in the figure above:
1. The UA initiates an emergency call to the CS over v1 and includes the PIDF-LO in the call
initiation message.
2. The CS determines the provisioned callback number and subscriber name associated with the
UA, and constructs an esrRequest message that includes a Call-ID, callback number,
subscriber name, and LIE containing the PIDF-LO. The CS sends the esrRequest message to
the VPC over v2.
UA
CS
1. Call Init
(PIDF-LO)
VPC
2. esrRequest (PIDF-LO,
customer, callback)
ERDB
PSTN
GW
3. erdbRequest
(invalid location)
4. erdbResponse
(error)
5. esrResponse (error)
7. Call Termination
Here is the detailed description of the procedure depicted in the figure above:
1. The UA initiates an emergency call to the CS over v1 and includes the PIDF-LO in the call
initiation message.
2. The CS determines the provisioned callback number and subscriber name associated with the
UA, and constructs an esrRequest message that includes a Call ID, callback number,
subscriber name, and a LIE containing the PIDF-LO. The CS sends the esrRequest message
to the VPC over v2.
3. The VPC receives the esrRequest from the CS and authenticates the CS. The VPC uses the
location contained in the PIDF-LO to request routing information based on the provided
assumed-to-be-valid location.
4. The ERDB authenticates the VPC and tries unsuccessfully to retrieve the location-associated
routing information from its database. The ERDB is unable to perform default routing using
the received location. It then constructs the erdbResponse to the VPC over v8 specifying the
error condition encountered.
5. The VPC receives the erdbResponse message and constructs an esrResponse message back to
the CS over v2 with the error condition included.
Security
The v8 interface will need to operate in a variety of network environments, some trusted, and some
not, as described previously. The v8 interface is an XML-based interface and should be used with a
suitable security mechanism as defined in Section 4. When the connection between the VPC and the
ERDB is not a trusted network, both the VPC and ERDB are expected to be protected with IPsec or
TLS, and thus require certificates rooted in VESA. Even in a trusted network, TLS protection is
advisable. Mutual authentication is required when cryptographic security is deployed.
6.10 v9 Interface LIS/VPC to RDS
The v9 interface, in the context of the i2 architecture, defines the communication protocol and
messaging between a LIS or VPC to the Root Discovery Service (RDS).
The RDS is the entity that stores the serving areas of ERDBs and VDBs. The RDS should be able to
accept queries that contain geo-spatial or civic location information. When queried with location
information, it returns a list of URIs for ERDBs or VDBs serving that area.
6.10.1 v9 Messages Definitions
A Request/Response message pair is defined here to allow a LIS or VPC to send a query to the RDS
that contains information describing the emergency callers location and to support the return of
URIs associated with VDBs or ERDBs that serve that area. XML messages are used to support this
information exchange.
6.10.1.1 v9 identityRequest Request VDB/ERDB Information
For the query, the identityRequest is expected to contain either geographical coordinates or civic
address information. The location information provided to the RDS in the query is derived from the
LO obtained by the VPC or from the Location Information stored in the LIS.
Table 6-31 - identityRequest Parameters
Parameter
geolocation
Condition
*Conditional
Description
WGS84 coordinates derived from LO
civiclocation
*Conditional
Condition
Mandatory
Description
Identifies whether VDB or ERDB information is
being requested
* One of these must be present; it is possible that both these elements may be present
geolocation Geolocation may be provided using gml notation as Point, Circle or Sphere. If Circle
or Sphere data is provided the RDS will use the center-point of the circle or sphere to determine the
appropriate ERDB/VDB.
<location>
<gml:Point srsName="urn:ogc:def:crs:EPSG:6.6:4326">
<gml:pos>37.775 -122.4194</gml:pos>
</gml:Point>
</location>
civiclocation the civic address must be provided using NENA data elements as defined in NENA
02-010 [11] and NENA 02-013 [38].
<location>
<civiclocation>
<HouseNum>700</HouseNum>
<HouseNumSuffix>A</HouseNumSuffix>
<PrefixDirectional>N</PrefixDirectional>
<StreetName>LAVACA</StreetName>
<StreetSuffix>ST</StreetSuffix>
<PostDirectional>S</PostDirectional>
<MSAGCommunity>AUSTIN</MSAGCommunity>
<PostalCommunity>AUSTIN</PostalCommunity>
<CountyName>TRAVIS</CountyName>
<CountyID>419</CountyID>
<StateProvince>TX</StateProvince>
<PostalCode>78701</PostalCode>
<Country>US</Country>
</civiclocation>
</location>
querytype format:
<querytype>ERDB</querytype>
or
<querytype>VDB</querytype>
<identityRequest xmlns="urn:nena:xml:ns:es:v9"
xmlns:alins=http://www.nena9-1-1.org/schemas/2003/ali
xmlns:gml=http://www.opengis.net/gml
xmlns:gs=http://www.opengis.net/pidflo/1.0"
xmlns:xsi=http://www.w3.org/2001/XMLSchema-instance
xsi:schemaLocation="urn:nena:xml:ns:es:v9 v9.xsd">
<querytype>ERDB</querytype>
<location>
<gml:Point srsName="urn:ogc:def:crs:EPSG:6.6:4326">
<gml:pos>37.775 -122.4194</gml:pos>
</gml:Point>
</location>
</identityRequest>
Circle Example
<identityRequest xmlns="urn:nena:xml:ns:es:v9"
xmlns:gml="http://www.opengis.net/gml"
xmlns:gs=http://www.opengis.net/pidflo/1.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="urn:nena:xml:ns:es:v9 v9.xsd">
<querytype>ERDB</querytype>
<location>
<gs:Circle srsName="urn:ogc:def:crs:EPSG:6.6:4326">
<gml:pos>37.775 -122.4194</gml:pos>
<gs:radius uom="urn:ogc:def:uom:EPSG::9001">30</gs:radius>
</gs:Circle>
</location>
</identityRequest>
Attribute
code
Condition
Mandatory
message
Optional
Description
Indicates error that occurred;
400 = not found
500 = general error
Text describing the error code
Condition
Mandatory
Description
If an ERDB/VDB cant be determined; this
message returns the civic address fields
which must be resolved before an answer
can be determined.
Parameters
erdbAddress
Condition
Conditional
poc
Conditional
VDB
Conditional
Description
List of ERDB URIs that have routing
information for the address or geo-position
submitted.
This only applies when geodetic information
is provided in the query. Percentage Overlap
Confidence value; this describes the
percentage of the initially provided callerlocation overlapped with the corresponding
ERDB service area.
List of VDB URIs that have MSAG
information for the address submitted.
<identityResponse xmlns="urn:nena:xml:ns:es:v9"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="urn:nena:xml:ns:es:v9 v9.xsd">
<found>
<VDB>
<vdbAddress>vernsvaluablevalidator.vendor.com</vdbAddress>
</VDB>
<VDB>
<vdbAddress>valerievolubleverifier.vendor2.com</vdbAddress>
</VDB>
</found>
</identityResponse>
<identityResponse xmlns="urn:nena:xml:ns:es:v9"
xmlns:alins=http://www.nena9-1-1.org/schemas/2003/ali
xmlns:gml=http://www.opengis.net/gml
xmlns:gs=http://www.opengis.net/pidflo/1.0"
xmlns:xsi=http://www.w3.org/2001/XMLSchema-instance
xsi:schemaLocation="urn:nena:xml:ns:es:v9:\MYDOCU~1\XMLSchema
\CurrentNENA\I2\v9\v9.xsd">
<error code="400" message="token"/>
</identityResponse>
Here is the detailed description of the procedure depicted in the figure above:
1. The LIS issues an identityRequest message to the RDS to discover the serving VDB for a
location it manages. It is assumed that the LIS is authenticated with the RDS.
2. The RDS searches its own database for corresponding records based on the provided
location. It then constructs an identityResponse message back to the LIS containing the
serving VDB URI(s).
Version 2, August 11, 2010
CS
1. Call Init
(PIDF-LO)
VPC
ESGW
3. identityRequest
(location)
4. identityResponse
(erdb URI(s), [poc])
7. esrResponse (ert or
esgwri, esqk, lro)
ERDB
RDS
5. erdbRequest
(location)
6. erdbResponse
(ert, crn, msagaddr)
8. Route Call
11. esctAck
Here is the detailed description of the procedure depicted in the figure above:
1. The UA initiates an emergency call to the CS over v1 and includes the PIDF-LO in the call
initiation message.
2. The CS determines the provisioned callback number and subscriber name associated with the
UA, and constructs an esrRequest message that includes a Call-ID, callback number,
Version 2, August 11, 2010
ALI
VPC
ALI
VPC
PSAP
one-to-one
many-to-many
It is not recommended that an E2 interface as described in TIA J-STD-036A (rather than NENA 05001) be used as the basis for the VPC to ALI interface. However, if this is the case, the ALI will not
be able to receive civic location information. It may receive some information, e.g., Callback
Number or geodetic location if it is available. Please refer to Appendix A.
If a PSAP-to-ALI Message (PAM) interface is used for communications between the VPC and the
ALI, this is not specified as part of the i2 Solution.
VPC operators may reuse existing physical interfaces to establish v-E2 logical connection along side
existing E2+ logical connections based on business agreements.
6.11.1 v-E2 Message Definitions
There are four Request/Response messages defined in NENA 05-001 that are defined here for use in
requesting and responding to requests for emergency call information from the VPC. The remainder
of this section details the four messages that make up communication across the v-E2 interface.
Parameter
Ref. in
NENA 05-001
Condition
Description/Value
Package Type=Query
with Permission
9.1.1
Mandatory
Query with
Permission
Transaction ID
9.1.2
Mandatory
Component Sequence
9.2.1
Mandatory
Component Type
9.2.2
Mandatory
Component ID
9.2.3
Mandatory
Operation Code
9.2.4
Mandatory
Parameter Set
9.2.7
Mandatory
ESMEIdentification
9.3.1
Mandatory
9.3.2
Mandatory
Emergency Services
Routing Key (esprKey)
9.3.3
Callback Number
9.3.4
Invoke (Last)
Private TCAP
29 This parameter is Optional in NENA 05-001 for wireless call information provided to the ESME from the MPC. However, when
the E2 interface is used to support VoIP call information from a VPC to an ESME, this parameter must be populated with the
Emergency Services Query Key.
Parameter
Package Type
Transaction ID
Component Sequence
Component Type
Component ID
Parameter Set
Position Result
PositionInformation
Geographic Position
Position Source
Reference in
NENA 05-001
Ref. in
this doc.
9.1.1
9.1.2
9.2.1
9.2.2
9.2.3
Mandatory
Mandatory
Mandatory
Mandatory
Mandatory
9.2.7
9.3.8
9.3.9
9.3.9.2
9.3.9.3
Mandatory
Mandatory
1.1.3.3
6.11.2.3
Inclusion
Condition
Optional
Optional
CallbackNumber
9.3.5
6.11.2.4 Conditional 30
9.3.7
5.11.2.5
NA
GeneralizedTime
9.3.11
6.11.2.6
Optional
MobileIdentificationNumber
InternationalMobileSubscribe
rIdentity (IMSI)
MobileCallStatus
CompanyID
9.3.12
9.3.13
6.11.2.7
-
NA
NA
9.3.14
9.3.15
6.11.2.8
NA
Mandatory 31
LocationDescription
9.3.16
6.11.2.9
Conditional
Description/Value
Response
Geo Location
Method of location
determination
Callers E.164
number
Not used.
(In the future this
parameter might be
populated with
ESQK )
Timestamp for
assignment of ESQK
Not used
Not used
Not used
Name of the VSP
(up to 15 characters)
Tagged elements of
30 This parameter is Optional in NENA 05-001 for wireless call information provided to the ESME from the MPC. However, when
the E2 interface is used to support VoIP call information from a VPC to an ESME, this parameter must be populated with an E.164
number identifying the Callback Number of the emergency caller, if it is available to the VPC.
31 This parameter is Optional in NENA 05-001 for wireless call information provided to the ESME from the MPC. However, when
the E2 interface is used to support VoIP call information from a VPC to an ESME, this parameter must be populated with
identification for the VoIP Service Provider, if it is available to the VPC. If one is not available, the VPC must substitute its own
name.
Reference in
NENA 05-001
Ref. in
this doc.
Inclusion
Condition
Description/Value
Parameter
Reference in
NENA 05-001
Reference
in this
document
Condition
Package Type
9.1.1
Mandatory
Transaction ID
9.1.2
Mandatory
Component Sequence
9.2.1
Mandatory
Component Type
9.2.2
Mandatory
Component ID
9.2.3
Mandatory
Error Code
9.2.5
Mandatory
Parameter Set
9.2.7
Mandatory
Description/Value
Response
Return Error
Note: No new error codes have been identified for this application.
6.11.1.4 Emergency Services Position Request Response Reject
This message is sent from the VPC to the ALI DB to inform the ALI DB that the invoke message
contains a Transaction or Component Level protocol error. The problem code describes the nature of
the protocol error.
Parameter
Reference in
NENA 05-001
Reference
in this
document
Condition
Package Type
9.1.1
Mandatory
Transaction ID
9.1.2
Mandatory
Component Sequence
9.2.1
Mandatory
Component Type
9.2.2
Mandatory
Component ID
9.2.3
Mandatory
Problem Code
9.2.6
Mandatory
Parameter Set
9.2.7
Mandatory
Description/Value
Response
Reject
Note: No new problem codes have been identified for this application.
6.11.2 Emergency Services Protocol (ESP) Parameters
This section identifies the use and also differences from NENA 05-001 that shall be supported when
the v-E2 interface is implemented between a VPC and the ALI DB.
6.11.2.1 ESMEIdentification
The ESMEIdentification parameter shall be populated with the identification of the ALI requesting
the location information.
6.11.2.2 Position Information Geographic Position Parameter
If coordinate-based location information is provided to the VPC for the emergency call, this
information shall be used to populate the Position Information Geographic Position Parameter.
Specifically, the VPC shall obtain the geodetic location parameters from the PIDF-LO contained in
the LIE parameter of the Emergency Services Routing Request received by the VPC over the v2
interface as described in Section 6.3. (If the VPC receives the LIE directly from an LIS, the
following requirements apply if a geodetic object is included.) Geo-coded location information
provided by the ERDB may also be used to populate the Position Information Geographic Position
parameter. The contents of these geodetic parameters shall be mapped to the v-E2 interface
Geographic Position parameter described in Section 9.3.10.2 of NENA 05-001, with one exception,
noted below.
If the received geodetic location object information does not include altitude or uncertainty
parameters, the VPC shall use the Type of Shape and Shape description corresponding to
Ellipsoid Point
(FUTURE, for further study) If the received geodetic location object information includes
uncertainty and confidence but not altitude parameters, the VPC shall use the Type of Shape
and Shape description corresponding to Ellipsoid Point with Uncertainty.
If the received geodetic location object information includes altitude, with or without
uncertainty parameters, and the altitude type is specified as meters, the VPC shall use the
Type of Shape and Shape description corresponding to Point with altitude and uncertainty.
The degrees of latitude shall be used to populate the Degrees of Latitude in the Type of
Shape and Shape description parameter. If degrees of latitude are provided in a format
different from the one supported on the v-E2 interface, or if the degrees of latitude are
provided in a coordinate system different from the one supported on the v-E2 interface (i.e.,
WGS84), the VPC shall convert the latitude information to a format suitable for coding of
degrees of latitude on the v-E2 interface.
The degrees of longitude shall be used to populate the Degrees of Longitude in the Type of
Shape and Shape description parameter. If degrees of longitude are provided in a format
different from the one supported on the v-E2 interface, or if the degrees of longitude are
provided in a coordinate system different from the one supported on the v-E2 interface (i.e.,
WGS84[35]), the VPC shall convert the longitude information to a format suitable for coding
of degrees of longitude on the V-E2 interface.
(Future) If an Uncertainty parameter value is included and available to the VPC, the VPC
may use this information to populate the Uncertainty code and Confidence parameters of the
Type of Shape and Shape description parameter.
If an Altitude parameter is included, and the Altitude type is specified as meters, the VPC
shall use its contents to populate the Altitude in the Type of Shape and Shape description
used for Point with Altitude and Uncertainty. If uncertainty/confidence values are not
available to the VPC, when an Altitude parameter is included, the value of K for the
uncertainty code and confidence shall be populated with 0 to indicate no information. If
Altitude Uncertainty and Confidence are included, the VPC shall use this information to
populate the Altitude Uncertainty code and Confidence parameters in the Type of Shape and
Shape description parameter. If Altitude uncertainty/confidence values are not available to
the VPC, when an Altitude parameter is included, the value of K for the uncertainty code and
confidence shall be populated with 0 to indicate no information.
Exception Case - If an Altitude parameter is included, and the Altitude type is specified as
floor, the VPC shall use the use its contents to populate the Location parameter contained
in the Location Description parameter described in NENA 05-001, Section 9.3.16, subject to
the additional requirements described in Section 6.11.2.9.
Position
Source
parameter
value
(decimal)
128
129
IP Unknown
IP Manual entry
130
131
132
IP Network Assisted RF
Derived (e.g., ToA,
Triangulation)
IP Radio Network Access
Point (e.g., lat/lon of cellualar
tower or of 802.11
transceiver)
IP Radio Network Access
Point (e.g., lat/lon of cellular
tower or of 802.11
transceiver)
IP - Radio Network Sector
(e.g. lat/lon of centroid of
cellular sector coverage
area, or centroid of 802.11
coverage area with
directional antennas)
IP GPS (e.g., GPS in the
handset)*
IP A-GPS (e.g., networkassisted GPS)*
132
133
134
135
Position Source
parameter value
meaning
Position
Source
parameter
value
(decimal)
136
Position Source
parameter value
meaning
Note: The values for GPS and A-GPS are provided here separately in order for contextual distinction
that implemented systems may rely on (i.e. GPS fix for a VoIP emergency call).
** Methods Tokens assigned by the IANA can be found at
http://www.iana.org/assignments/method-tokens/
6.11.2.4 Callback Number
The Callback Number parameter shall be populated with an E.164 number that represents the
emergency caller in the i2 Solution. This Callback Number shall be derived by the VPC from the
Callback parameter of the Emergency Services Routing Request described for the v2 interface in
Section 6.3.
6.11.2.5 Emergency Services Routing Key
The VPC shall populate the Emergency Services Routing Digits Request Response parameter with
the Emergency Services Query Key received in the ESPOSREQ message and used by the VPC as a
key to obtaining the emergency call related information used in this response.
6.11.2.6 Generalized Time
The VPC shall populate the Generalized Time parameter with the time that the ESQK was allocated
to the current emergency call (with which it is associated and for which location information is being
provided).
6.11.2.7 Mobile Identification Number
The VPC may populate the Mobile Identification Number with the Main Telephone Number
(applicable in Multi-Line Telephone Systems) if one is provided for the emergency call. Otherwise,
this optional parameter can be omitted.
6.11.2.8 Company ID
The VPC shall populate this parameter with the name of the VoIP Service Provider, if available.
32 This position source parameter value can be used to indicate a geo-coded location.
Populated by
the VPC
*NOTE: This information shall be included in the contents of the <LOC> tagged field as follows:
If included in the PIDF-LO, these fields shall be concatenated in the following order: Floor,
Location (LOC).
Each field shall be directly preceded by the indicated abbreviation (i.e., FL, LOC), and shall
be separated from the next field by the character ~ (tilde).
33 The VPC must convert the received County Name to a FIPS County Code.
34 While incorporated in the Location Description container, the name here is not associated with the physical location or the
broadband connection, but rather the VoIP service subscriber name.
If the information for a given field cannot be included completely (i.e., without truncating it),
then the last (truncated) field to be included shall also end with the character ~ (tilde) to
indicate that it has been truncated.
The VPC operator and the E9-1-1 Service Provider/Database operator should determine if an
administrative ESN value can be transmitted over the v-E2 interface without causing any detrimental
affects to the 9-1-1 system.
If supported, the VPC shall use the administrative ESN received from the ERDB to populate the
ESN tagged field in the Location Description parameter. If an administrative ESN is not available
for the call, then the VPC may use the value of the Routing ESN to populate the ESN, or shall omit
the ESN tagged value from the Location Description parameter.
6.11.3 v-E2 Message flows, Key Scenarios and Semantics
The following call flow shows a 9-1-1 call where the CS interacts with a VPC to obtain the
necessary 9-1-1 call routing information and then uses the received routing information to route the
call to the ESGW. The ESGW routes the call forward to the SR which delivers it to the PSAP. The
PSAP queries an ALI database for location information. The ALI database queries the VPC for
location information and passes it to the PSAP. Messages which pertain to the v-E2 interface are
shown in bold red.
UA
CS
VPC
PSAP
SR
ESGW
ALI
1. INVITE
(911, PIDF-LO,
callid1, SDP1)
2. 100 Trying
3. esrRequest
(PIDF-LO, [customer],
[callback])
4. esrResponse
(ert/esgwri, esqk, lro)
5. INVITE
(callid1, esgwri, esqk,
[callback], SDP1)
6. IAM
(esqk, [callback])
7. 100 Trying
8. ACM
10. 183 Session
Progress (SDP2)
9. Call Delivery
esqk, [callback])
12.Audible Ringing
29. RLC
31. esctAck
(vpc, callid1)
The organizational components of the i2 solution refer to those entities, commercial or public, which
operate the various network elements in this architecture. For example, there are those entities that
are responsible for the operation of a Call Server, those entities that are responsible for the operation
of an ESGW, and those entities that are responsible for the operation of a Selective Router. In
practice these entities may have responsibility for one or more instances of these network elements
and may have a scope which is considerably larger than just the operation of i2 defined network
elements. Thus, the entities defined here are logical ones the key in recognizing whether any of the
roles associated with these entities apply to any given real world party, is whether that party has
specific ownership and responsibility for the effective operation of the corresponding network entity.
Similarly the implementation of a specific logical network element may be such that various
components of the implementation are shared by more than one entity. In this case the owning
entities are jointly responsible and individually answerable for the effective operation of the network
element constituted by that implementation.
Caller Operates the device from which the call is made and initiates the call to emergency
services.
VoIP Service Provider (VSP) Operates the network equipment that provides call
processing for subscribers.
Redirect Operator Operates Redirect Server(s).
Routing Proxy Operator Operates Routing Proxy server(s).
LIS Operator Operates the LIS associated with the IP access network used by the callers.
ESGW Operator Operates emergency service gateway(s).
SR Operator Operates the Selective Router(s) corresponding to specific local exchange
areas.
PSAP Operator Operates the Public Safety Answering Points in a particular county, state,
or other regional jurisdiction.
ALI Operator Operates the Automatic Location Identification infrastructure used to
provide caller information associated with a pANI offered in a query from a PSAP.
VPC Operator Operates VPC network element(s).
Credential Authority An authority responsible for supporting the infrastructure to assign
and revoke electronic digital certificates to i2 network entities.
Routing Number Authority (RNA) An authority responsible for distributing ranges of
numbers to network operators for the purposes of call routing and query steering.
MSAG Source Is responsible for defining, maintaining and publishing the Master Street
Address Guide for a given coverage area.
Validation Database (VDB) Operator An operator that provides location information
validation services to LIS operators and other users.
Emergency Service Zone (ESZ) Routing Database (ERDB) Operator An operator that
supports the real time routing server that can resolve location information to emergency
service zone route at the request of a VPC.
Root Discovery Operator (RDO) - The operator that supports the well known root database
from which the URI of the correct VDB or ERDB can be determined based on regional
location information.
9-1-1 Administrator The administrative jurisdiction of a particular 9-1-1 system. This could
be a county/parish or city government, a special 9-1-1 or Emergency Communications
District, a Council of Governments, an individual PSAP or other similar body.
The different organizational entities, overlaid on their corresponding functional entities, are shown in
the following diagram.
ESGW
Operator
SR
Operator
ESGW
Routing
Number
Authority
Selective
Router
Proxy
Operator
VSP
Proxy
Server
VPC
Operator
PSAP
Call
Server
PSAP
Operator
VPC
ESQK
Source
Redirect
Server
Credential
Authority
ALI
Redirect
Operator
ERDB
Discovery
Certificate
Source
Root
discovery
operator
Client
Device
ERDB
ALI
Operator
ERDB
Operator
MSAG
Caller
VDB
Discovery
Root
discovery
operator
VDB
MSAG
Source
VDB
Operator
LIS
LIS
Operator
Responsibilities
7.1.1
Caller
The caller is responsible for initiating the emergency call by inputting the appropriate emergency
service number (e.g., 9-1-1). Arbitrary VoIP devices utilized on arbitrary access networks may
not provide sufficient functionality to be properly supported by the i2 network and last resort
routing, or even failure to deliver the call to any emergency operator, may occur.
The caller may also be known as the subscriber. The caller is the individual initiating the actual
emergency call. The subscriber is the individual who nominally owns the device and service
subscription. The terms caller and subscriber may be used relatively interchangeably in the
document text depending on context.
7.1.2
The VoIP Service Provider (VSP) operates the Call Server/Proxy which is directly utilized by the
caller to initiate the emergency call on the v1 interface. It is the VSPs responsibility to ensure that
its call server(s) can appropriately identify that an emergency call has been invoked by the caller and
to initiate appropriate call handling. This appropriate handling includes the following:
Redirect Operator
The redirect operator maintains redirect server(s) and provides access to authorized call servers
which are in receipt of an emergency call using the v5 interface definitions. The redirect operator is
responsible for ensuring that redirect server equipment has access to VPC functionality that can
provide routing direction for all areas from which their VSP user base can originate calls.
7.1.4
The Routing Proxy operator maintains proxy server(s) and provides access to authorized call servers
which are in receipt of an emergency call using the v6 interface definitions. The Routing Proxy
operator is responsible for ensuring that it can determine the appropriate routing information by
accessing relevant VPC functionality, and that it has access to the necessary ESGW infrastructure to
deliver calls for those areas.
7.1.5
LIS Operator
This operator is associated with a particular IP network access area. The LIS operator is responsible
for providing an operating infrastructure which supports requests for location information by
individual end user devices (UA) and/or properly credentialed network elements (e.g. VPC) over the
v0 and v3 interfaces respectively. The LIS operator is also responsible for providing technologies
and processes which ensure that the geographical location information provided with respect to users
is correct to within a specified range of accuracy. Where the location is effectively constrained to a
specified range, as determined by other standards, regulatory rulings, contract, etc., LIS operators are
responsible for providing a Civic Address corresponding to that location when one is applicable. LIS
operators are responsible for ensuring that this Civic Address information is properly and
independently validated with an appropriate VDB to ensure successful resolution of destination
when that address is used to route emergency calls.
7.1.6
ESGW Operator
The ESGW operator provides the equipment to interface between the IP network and the legacy
circuit switch-based emergency network. The ESGW operator is responsible for providing sufficient
and reliable capacity for the delivery of emergency calls to the Selective Router network elements in
their area of coverage. ESGW operators are responsible for ensuring that calls are placed on the
correct trunks based on the ESGWRI provided in emergency call setup signaling and in accordance
with the guidance of the corresponding SR operator as to which trunks correspond to which values
of routing information. ESGW operators are responsible for providing the appropriate signaling (i.e.,
MF or SS7, and appropriate number of digits (i.e., 10-digits [ESQK only] or 20-digits [ESQK +
callback number]) for the trunk groups over which emergency calls are to be delivered to an SR,
based on input from the SR operator. ESGW operators are responsible for ensuring that the call
server operators to whom they provide service, or VPC operators, if the translation from ERT to
ESGWRI is to be performed by the VPC, are informed which ESGWRIs are applicable to which
ESGW instances that they operate. The ESGW operator is also responsible for ensuring that the
Version 2, August 11, 2010
These operators provide the infrastructure to deliver calls arriving on trunks from ESGW network
elements to the correct serving PSAP based on the routing information in the call setup signaling.
They provide the equipment to adapt to the signaling and voice bearer media (e.g. CAMA) used by
the PSAP CPE. This equipment maintains the call state between the SR and the PSAP and responds
appropriately to mid-call commands such as call transfer requests to emergency responders. The SR
operator is responsible for ensuring that correct default, contingency, and congestion call routing
functions are configured for all incoming ESGW trunks. They are responsible for ensuring that
ESQK entries in the Selective Routing Database (SRDB) are configured to support call delivery to
the correct PSAP, selective transfer, etc. based on the correct ESN associations. SR operators are
responsible for working with the VPC operator either directly or through the MSAG administrator to
ensure that ESQK block assignments are correctly associated with the appropriate ERT. SR
operators are responsible for providing the correct information associated with unique routing data to
ESGW operators that connect to the SR(s) such that those operators can provision the correct trunk,
default, contingency, and congestion routing data against each ESGWRI in their systems.
7.1.8
PSAP Operators
PSAP operators provide the call center resources which take and assess emergency calls to
determine appropriate handling of the call. They are responsible for connecting the caller to the
correct first responder organizations when necessary. They are responsible for ensuring that they
operate the necessary CPE with associated staffing capacity and reliability to serve the volume of
calls originating in their serving area. They are responsible for ensuring that they have the necessary
CPE to query ALI equipment and receive and display call related information including the callers
location.
PSAP operators provide direction in terms of the correct default routing for calls that the network
needs to support. They may also have a role in specifying the necessary ESQK block allocation sizes
on a per ESZ basis.
7.1.9
ALI Operator
ALI operators provide the infrastructure to PSAP operators to retrieve the location, ESN
information, and other call related information based on the query key that was provided for the call.
Certificate
Source
VESA
Credential
Authority
Delegation
Delegate
Credential
Authority
Certificate
Source
Delegate
Credential
Authority
Certificate
Source
Delegate
Credential
Authority
Certificate
Source
MSAG
MSAG
Data
DB MSAG Source
MSAG
Operator
MSAG
Admin
This issue contains references to documents which were work in progress (e.g., Internet Draft at
the IETF) at the time of writing. This document may be revised as these references stabilize.
[1] IETF RFC 1032, Establishing a Domain Guidelines for Administrators, M. Stahl, November
1987.
[2] IETF RFC 1033, Domain Administrators Operations Guide, M. Lottor, November 1987.
[3] IETF RFC 1035, Domain Names Implementation and Specification, P. Mockapetris,
November 1987.
[4] IETF RFC 2131, Dynamic Host Configuration Protocol, R. Droms, March 1997.
[5] IETF RFC 3261, SIP: Session Initiation Protocol, J. Rosenberg et al, June 2002.
[6] IETF RFC 3825, Dynamic Host Configuration Protocol Option for Coordinate-based Location
Configuration Information, July 2004
[7] IETF RFC 4776, Dynamic Host Configuration Protocol (DHCPv4 and DHCPv6) Option for
Civic Addresses Configuration Information, H. Schulzrinne, November 2006.
[8] IETF RFC 4119, A Presence-based GEOPRIV Location Object Format, J. Peterson, December
2005
[9] Void
[10] Void
[11] NENA 02-010, NENA Standard Data Formats for ALI Data Exchange & GIS Mapping,
Version 8.2, June 10, 2009
[12] IETF Internet Draft, Location Conveyance for the Session Initiation Protocol, J. Polk & B.
Rosen, draft-ietf-sipcore-location-conveyance
[13] NENA 05-001, Implementation of the Wireless Emergency Service Protocol E2 Interface, Issue
1, December 2, 2003
[14] IETF RFC 2313, PKCS #1: RSA Encryption, Version 1.5, March 1998
[15] IETF RFC 3280, Internet X.509 Public Key Infrastructure Certificate and Certificate
Revocation List (CRL) Profile, April 2002
[16] NIST FIPS PUB 197, Advanced Encryption Standard, November 2001
[17] IETF RFC 4301, Security Architecture for the Internet Protocol, S. Kent & K. Seo, December
2005
[18] IETF RFC 5491, GEOPRIV PIDF-LO Usage Clarification, Considerations and
Recommendations, J.Winterbottom, M. Thomson, H. Tschofenig, March 2009
[19] IETF RFC 3174, US Secure Hash Algorithm 1 (SHA1), D. Eastlake, 3rd et al, September 2001
[20] RSA-1024, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, R.L.
Rivest et al, September 1, 1977
Version 2, August 11, 2010
Exhibits (Informative)
9.1
9.1.1
Purpose
This section provides a list of potential system changes on the ALI that could be considered
when implementing the i2 solution.
9.1.2
Overview
The initial i2 deployment will be similar to Wireless Wireline Compatibility Mode as specified
in J-STD-036. The VoIP provider will deliver an ESQK into the 9-1-1 Network. The PSAP will
query the local Emergency Services Message Entity, the ALI system, with the ESQK. Once the
ESME receives the ESQK from the PSAP it will query the VoIP Positioning Center (VPC) using
the E2+ message format as implemented over the v-E2 interface. This implementation approach
may necessitate software changes to an ESME that is currently supporting an E2 NCAS
deployment only. NENA 080-001, Issue 2, allows for 20 digits (i.e., ESQK + Callback
Number) to be delivered to the SR, and included in the v-E2 ESPOSREQ (query) message sent
to the VPC.
The E2 NCAS deployment allows for the delivery of the Callback Number and Emergency
Services Routing Digit to the PSAP (Format B within J-STD-036-B). In the E2 NCAS
deployment the callers geodetic location is obtained from the Mobile Positioning Center and the
data associated with the Emergency Services Routing Digits, as stored within the ESME, is used
for the cell site address. This differs from a deployment that uses the E2+ message format. When
the E2+ message format is used, the VPC is responsible for delivery of the Callback Number and
will place the civic address of the VoIP caller into tagged fields of the E2+ Location Description
parameter.
9.1.3
The following list is informative. The Pubic Service Agency should consult with their 9-1-1
System Service Provider to obtain an analysis of the potential changes required for implementing
the i2 solution. This text is meant to be used for discussion between the PSAP and the ALI
provider.
Implement E2+ query based on ESQK or ESQK + Callback Number. ESQK shall be
placed into the ESRK field of Emergency Services Protocol message. Since the ESQK
will have the same form and function as the ESRK, there will be no change to the
existing ESRK field. The Callback Number, if included will be placed in the Callback
Number Request parameter of the ESPOSREQ message, as described in Section 9.3.4
of NENA 05-001.
Implement parsing of tagged fields in the E2+ Location Description parameter into the
ALI format.
o Determine if any E2+ fields should not be used.
o Determine approach for using ESN returned in E2+ response and how agency names
will be displayed.
o Review the <LOC> tag and any data elements delivered in this field.
Determine if any conflict exists with existing ALI format.
o Determine if there are any embedded labels in the ALI format that may need to be
accounted for when parsing the VoIP data.
Review VoIP Class of Service values and determine if any changes need to be made in
call detail reports or Computer Aided Dispatch systems.
Determine if the E2+ Position Source or ALI ESQK shell record shall be used to create a
VoIP Class of Service.
o Ensure that the VoIP Position Source value(s) are NOT interpreted as wireless values.
Determine if the existing ALI format has any conflicts for displaying geodetic Location
and Civic Location fields at the same time. This may be an issue if your existing ALI
format has multi use fields.
o Determine if a VoIP position source or Class of Service can be used to prioritize
when a Geo Location or Civic Location should be displayed.
Determine if there is a need for additional ALI text messages.
o ESME should have the ability to distinguish when steering is done to a MPC or a
VPC. This will be necessary to ensure wireless text messages are not created for VPC
responses.
9.2
9.2.1
The VDB must be able to translate AV, AVE, AVEN, AVENU, AVENUE, AVN and ANVUE
to the USPS accepted abbreviation of AVE.
Address received
over the v7
Result Code
OAK AVE
OAK AV
Oak Ave
OAK AVE.
100 (Success)
102 (Alt returned)
102 (Alt returned)
102 (Alt returned)
Address contained
in the MSAG and
returned over v-E2
OAK AVN
OAK AVN
OAK AVN
OAK AVN
Address returned
over the v7
OAK AVE
OAK AVE
OAK AVE
OAK AVE
Table 9-2: Examples of Street and Street Suffix Names as input/outputs over v7
9.2.1.1
The VDB may optionally do more than matching based on a standardized list. For example, if a
VDB receives AVINU, it could decide to associate and return AVE in the v7 response. The
limit of this VDB functionality should be incumbent on the specific implementation.
Version 2, (Board Approval Date)
9.3
This appendix is provided for informational purposes only. The intent of the appendix is to
illustrate the fact that postal addresses and MSAG addresses are very often different and it is the
MSAG address which is required to ensure proper dispatch at the PSAP.
Information for VDB Developers
Example using actual MSAG data; postal addresses were looked up at
http://www.satorisoftware.com/US/addresscheck/AddressCheck.asp.
These are just some customer address examples pulled at random from MSAGs around the
country (no searches were done to find examples likely to not match to Postal addresses). Based
on this tiny sample it appears that conformity to Postal addresses is going to vary widely from
MSAG to MSAG with most MSAGs being very different from the Postal.
Variations of Andover in MSAG (each of these variations will have a different set of valid streets
and addresses associated with them):
Community
ANDOVER
BORO
ANDOVER
BORO
ANDOVER TWP
County
SMST
State
NJ
SUSX
NJ
SUSX
NJ
MSAG Address
18 AMBLER LANE
ABERDEEN TWP, NJ
Postal Address
18 Ambler Ln
Matawan NJ 07747-1225
County name: Monmouth
1 CLIFFSIDE WAY
ANDOVER TWP NJ
1 Cliffside Way
Andover NJ 07821-5042
County name: Sussex
Comment
Note that Postal City does not match
MSAG City.
Postal lookup failed if zip not supplied
using city name ABERDEEN TWP;
worked without zip if TWP omitted.
Note that Postal City does not contain
TWP.
Postal lookup failed if zip not supplied
using city name ANDOVER TWP;
worked without zip if TWP omitted.
Mapquest returned: You searched for
"400 us hwy no 206, andover, nj
07860", MapQuest did not find this
exact address, but found one very
similar: "400 Us Highway 206 S,
Page 226 of 247
MSAG Address
Postal Address
17 AVENUE A ST
NEWARK CITY NJ
2184 AZALEA AVE
WALL TWP NJ
10 ACADEMY DR E
HANOVER TWP NJ
10 Academy Dr E
Whippany NJ 079811801
County name: Morris
2948 HIGHWAY 72 E
ABBEVILLE, ABB, SC
2948 Highway 72 E
Abbeville SC 296205258
County name: Abbeville
4216 Taylor Creek Rd
Afton VA 22920-2159
County name: Albemarle
105 E Holland St
Archbold OH 435021210
County name: Fulton
Lookup failed with or
without zip
921 LIGHTHOUSE
CHURCH RD
BAKER, OKA, FL
Comment
Newton, NJ 07860-6002".
Postal lookup failed if zip not supplied
using city name BARRINGTON
BORO; worked without zip if BORO
omitted.
Note that Postal City does not contain
CITY
Note that Postal City does not match
MSAG City.
The MSAG has a few streets in it for
Sea Girt, NJ Azalea Ave is not one
of them.
Postal lookup failed if zip not supplied
using city name WALL TWP; worked
without zip if TWP omitted.
Note that Postal City does not match
MSAG City.
Whippany, NJ is not in the MSAG
Postal lookup failed if zip not supplied
using city name HANOVER TWP;
worked without zip if TWP omitted
Mapquest returned:
You searched for "921 LIGHTHOUSE
CHURCH RD, BAKER, FL 32531",
MapQuest did not find this exact
address, but found one very similar:
"Baker, FL 32531".
Note that Postal City does not match
MSAG City.
Page 227 of 247
MSAG Address
31496 330TH ST
BARNARD, NOD, MO
Postal Address
31496 330th St
Barnard MO 64423-8240
County name: Nodaway
139 SAWYERS CREEK 139 Sawyers Creek Rd
RD
Camden NC 27921-7507
CAMDEN, CAM, NC
County name: Camden
32995 TERRACE VIEW Lookup failed with or
RD
without zip
CAPE KIWANDA, TIL,
OR
34 DUNKARD
CHURCH RD
DELAWARE TWP,
HUNT, NJ
1463 RD 51 E
DIX, KIM, NE
1720 SCIOTO RD
ELIZABETHTON, UNI,
TN
34 Dunkard Church Rd
Stockton NJ 08559-1405
County name: Hunterdon
1463 Road 51 E
Dix NE 69133-8920
County name: Kimball
1720 Sciota Rd
Elizabethton TN 376431904
County name: Carter
Comment
Mapquest returned:
You searched for "32995 Terrace View
Rd, Cape Kiwanda, OR 97135", MapQuest
did not find this exact address, but
found one very similar: "Pacific City, OR
97135".
Mapquest returned:
You searched for "8620 N CR 800 E,
DECATUR, IN 46733", MapQuest did not
find this exact address, but found one
very similar: "8620 N 800 E-90, Decatur,
IN 46733-9202".
Note that Postal City does not match
MSAG City.
Mapquest returned:
You searched for "1720 SCIOTO RD,
ELIZABETHTON, TN 37643", MapQuest
did not find this exact address, but
found one very similar: "Elizabethton,
TN 37643-1904".
street number or box number out of
range
Mapquest returned:
Map of the address
MSAG Address
13228 US 24
EMERALD TWP, PAU,
OH
Postal Address
13228 US 24
Cecil OH 45821-9401
County name: Paulding
Comment
Note that Postal City does not match
MSAG City.
9.4
ERDB discovery consists of sending location information to a root discovery node and being
returned the URI of an ERDB that can provide routing information for the associated call.
Geodetic information is normally expressed as an area or volume, so in border areas it is
possible, indeed quite likely, that the geodetic area representing the location of the caller may
span more than one ERDB. In this case the VPC will receive more than one ERDB URI.
Expressing service areas using geodetic coordinates to define a polygon is a relatively common
practice today to describe PSAP service boundaries. Errors in boundary specification between
two adjacent service areas may result in 'holes', areas in which neither PSAP will claim coverage,
or overlap where more than one PSAP would claim coverage. As of the time of writing it is
acknowledge that some geodetic PSAP boundary errors can range between 10 and 30 meters.
Figure 9-1 illustrates a typical ERDB service area polygon.
9.4.1
Polygon Definition
As described earlier, geodetic representations for PSAP boundaries today can have errors in
coverage ranging from 10 to 30 meters, and these can result in coverage gaps where a caller may
not be able to reach a PSAP. In an attempt to overcome these problems, specific measures are
put in place for ERDB area definitions.
Geodetic locations are most likely to be provided to, or by mobile devices. High accuracy
geodetic locations using A-GPS systems typically yield a location with an uncertainty radius of
around 30 meters or better. Providing an overlap of 50 meters will result in a significant
reduction in the chance of misrouting a call, but will also result in almost no chance for the
existence of coverage gaps. Where ERDB boundaries are known to be of extremely high
precision, or frequent misrouting is known to occur, the degree of overlap between service areas
can be reduced. A safety net of 50 meters overlap however is recommended as the norm.
Specific polygon definition rules are as follows:
1. Polygons must be expressed in 2 dimensions using the EPSG:4326 coordinate reference
system.
2. Polygons must be defined with the upward normal being in the upward direction. To
accomplish this, polygon vertices must be defined in a counter-clockwise direction.
3. Lines between adjacent polygon vertices are minimum distance (geodesic).
4. Polygons must be closed areas, with the first and last points in the definition being the
same.
5. A connecting line SHALL NOT cross another connecting line.
6. Two successive points must not be diametrically opposed on the ellipsoid.
7. This definition does not permit connecting lines greater than roughly 20,000 km. If such a
need arises, the polygon can be described by adding an intermediate point.
8. There are no restrictions on the number of points that may be used to represent a service
area polygon.
9.4.2
Endpoint geodetic location information in this specification is provided from the VPC to the
ALI/PSAP over the v-E2 interface, which reuses the E2 specification [34] in existence for
cellular wireless. This interface restricts the formats of geodetic information to:
ellipsoid point (latitude, longitude)
ellipsoid point with altitude (latitude, longitude, altitude)
ellipsoid point with uncertainty radius (latitude, longitude, radius)
ellipsoid point with altitude and uncertainty radius (latitude, longitude, altitude, radius).
Since location conveyance to the PSAP is restricted to these forms, these will be the supported
locations for acceptance by the ERDB root discovery server. Location is provided inside a
PIDF-LO [8][37] document to the VPC, and it is expected that the geodetic location information
be constricted to the shapes and forms defined in the GeoShapes specification [42]. The
GeoShapes specification supports a number of shapes in addition to those supported by the v-E2
and ERDB root discovery interface. If the VPC receives a shape other than one that is acceptable
to the ERDB root discovery node, the VPC must either convert the shape to an acceptable form
without loss of coverage, or provide some kind of default routing for the call 37. The VPC must
not provide the unacceptable shape type to the ERDB root discovery node. Valid GeoShapes,
37 These conversions can and do occur today in GMLCs and MPCs that operate in cellular wireless networks, as location
determination techniques vary across carrier deployments and technologies.
and their v-E2 equivalents are provided in Error! Reference source not found.Table 9-1-1,
where a GeoShape requires conversion this is clearly indicated.
Geo Shape
Type
Point
VPC Actions
Ellipsoid Point
Ellipsoid Point with altitude
Pass to Root
Discovery
Server
Circle
Sphere
Pass to Root
Discovery
Server
Pass to Root
Discovery
Server
Conversion 38
Required
Conversion
Required
Conversion
Required
Conversion
Required
Conversion
Required
Ellipse
Ellipsoid
Polygon
Prism
ArcBand
Notes
Geoshape uses the
EPSG:4326 CRS
for 2d points, and
the EPSG:4979
CRS for 3d points
GeoShape Examples
Following are examples of the GeoShapes supported by the v-E2 and ERDB root discovery
interfaces
9.4.2.1.1 Point
2D point:
38 Conversion methodology is left to implementation. Where conversion is performed, the converted shape is used to query both
the Root Discovery Server and later the ERDB and for return to the PSAP over the v-E2 interface.
<gml:Point srsName="urn:ogc:def:crs:EPSG::4326"
xmlns:gml="http://www.opengis.net/gml">
<gml:pos>-34.407 150.883</gml:pos>
</gml:Point>
3D point :
<gml:Point srsName="urn:ogc:def:crs:EPSG::4979"
xmlns:gml="http://www.opengis.net/gml">
<gml:pos>-34.407 150.883 24.8</gml:pos>
</gml:Point>
9.4.2.1.2 Circle
<gs:Circle srsName="urn:ogc:def:crs:EPSG::4326"
xmlns:gs=http://www.opengis.net/pidflo/1.0"
xmlns:gml="http://www.opengis.net/gml">
<gml:pos>42.5463 -73.2512</gml:pos>
<gml:radius uom="urn:ogc:def:uom:EPSG::9001">850.24</gml:radius>
</gs:Circle>
9.4.2.1.3 Sphere
<gs:Sphere srsName="urn:ogc:def:crs:EPSG::4979"
xmlns:gs=http://www.opengis.net/pidflo/1.0"
xmlns:gml="http://www.opengis.net/gml">
<gml:pos>42.5463 -73.2512 26.3</gml:pos>
<gs:radius uom="urn:ogc:def:uom:EPSG::9001">850.24</gs:radius>
</gs:Sphere>
9.4.3
ERDB root discovery nodes are expected to be provisioned with polygons representing ERDB
service boundary areas.
These files must provide a linkage between service area and an ERDB URI. The format of the
provisioning file and constraints around area representation are described in the following
subsections.
<?xml version="1.0"?>
<erdbBoundaryDefinition
xmlns="urn:nena:xml:ns:es:geoErdbRdo"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="urn:nena:xml:ns:es:geoErdbRdo
geoErdbRdo.xsd">
<erdbID>
<erdbURI>https://www.erdb.harriscounty.tx.gov/erdb.html</erdbURI>
<erdbCommonname>Harris County Texas ERDB</erdbCommonname>
<createDate>2006-10-01T13:00:00Z</createDate>
<expiryDate>2006-11-01T13:00:00Z</expiryDate>
<effectiveDate>2006-10-02T13:00:00Z</effectiveDate>
</erdbID>
<gml:Polygon srsName="urn:ogc:def:crs:EPSG::4326"
xmlns:gml="http://www.opengis.net/gml">
<gml:exterior>
<gml:LinearRing>
<gml:pos>42.556844 -73.248157</gml:pos>
<gml:pos>42.549631 -73.237283</gml:pos>
<gml:pos>42.539087 -73.240328</gml:pos>
<gml:pos>42.535756 -73.254242</gml:pos>
<gml:pos>42.542969 -73.265115</gml:pos>
<gml:pos>42.553513 -73.262075</gml:pos>
<gml:pos>42.556844 -73.248157</gml:pos>
</gml:LinearRing>
</gml:exterior>
</gml:Polygon>
</erdbBoundaryDefinition>
9.4.4
Communication between a VPC and the ERDB root discovery server is performed using the v9
interface. This is a web services protocol that supports sending a single GeoShape object, Point
(2-D or 3-D), Circle, or Sphere from the VPC to the root discovery server. The response from the
root discovery server will be a list of zero or more ERDB URIs, along with a Percentage Overlap
Confidence (POC) value. The POC value describes the percentage of the initially provided
caller-location area (point plus uncertainty) overlapped with the corresponding ERDB service
area. This is illustrated in Figure 9-1-2 below.
If the location sent to the root discovery server is a 3 dimensional point, or a sphere, then the root
discovery server must project the shape into two dimensions prior to calculating the POC value.
This may be done by simply ignoring the altitude components.
The VPC should include the POC value and ERDB URI in event records generated for received
routing requests. This will assist ERDB and VPC operators in determining which areas and
boundaries are most susceptible to misrouting calls. Data for these areas can then be refined so
that improvements in routing data can be made.
Version 2, (Board Approval Date)
The POC value is a value between 0 and 100, where 0 represents no overlap, and 100 represents
complete overlap. A value of 0 should never be returned by the root discovery node, unless
specific default handling capabilities are provisioned into it.
The POC is calculated by finding the area of overlap, Ao , between the caller area, Ac , and the
ERDB service area, SAerdb.
The list of ERDB URIs returned to the VPC by the root discovery node should be in descending
order by POC value. The highest POC valued ERDB URI should occur first in the list. It may be
possible that one or more ERDB URIs may have the same non-zero POC value, in which case all
the ERDB URIs will be returned in the list.
9.5
Web Services
A number of the new vx interfaces described in this document use Web Services. This section is
intended to serve as a high-level tutorial of Web Services.
A web service is a software application identified by a URI, whose interface and bindings are
capable of being identified, described and discovered by XML artifacts and supports direct
interactions with other software application using XML based messages via Internet-based
protocols.
(World Wide Web Consortium)
A web service is a collection of protocols and standards used for exchanging data between
applications. Software applications written in various programming languages and running on
various platforms can use web services to exchange data over the internet in a manner similar to
inter-process communications on a single computer.
9.5.1
9.5.2
Standards used
XML: All data to be exchanged is formatted with XML tags. This encoding can be
performed by Simple Object Access Protocol (SOAP) or XML-Remote Procedure Call
(RPC) (note: industry standards for security, interoperability, etc. are based on SOAP).
Common protocols: XML data can be transported between applications using common
protocols such as Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), and
Simple Mail Transfer Protocol (SMTP).
Web Services Description Language (WSDL): The public interface to the web service is
described by WSDL. This is an XML-based service description on how to communicate
using the web service. It describes the operations the service has available, the messages
the service will accept, and the protocol of the service.
Universal Description, Discovery, and Integration (UDDI): The web service information
is published using this protocol. It enables applications to look up web services
information in order to determine whether to use them.
SOAP: The service messaging layer of a web service. The messages are XML based.
The protocol consists of three parts: an envelope that defines a framework for describing
what is in a message and how to process it, a set of encoding rules for expressing
instances of application-defined datatypes, and a convention for representing remote
procedure calls and responses.
Key Points regarding Web Services
Web services are programming language and platform neutral. A web service can be
written in Microsofts .NET on a Windows platform and accessed via a UNIX Java
platform or other common development platforms.
Web services are industry standard. They were developed by the World Wide Web
Consortium and the standards are freely available.
The Web Services interfaces are XML-based and certain text characters have special meanings
to XML and HTML. As a result, these characters cannot be passed through the interface directly.
Instead, the client must substitute standard HTML character codes for these characters. The
following table lists the characters and the codes used to replace them.
Table 9-9-4 HTML Code Table
Character
HTML Code
&
(apostrophe)
<
>
(double quote)
&
'
<
>
"
9.6
v7 Client Considerations/Recommendations
The v7 interface specification addresses only the messaging between a v7 client (e.g., a LIS) and
a v7 server (e.g., a VDB). This section is informative and presents suggestions and/or guidelines
that are outside the scope of the v7 interface standard. Following these guidelines will help a
VDB and v7 client developer ensure that their users can validate addresses quickly, and help
ensure that the v7 client is well behaved with respect to a v7 server.
9.6.1
Overview
A typical v7 client will provide a Graphical User Interface (GUI) to a user to collect addresses
for validation. The v7 client will use the data from the GUI to create and send v7 messages to the
VDB (the v7 server). The v7 client will receive the v7 response message, parse the message, then
use the parsed data to populate fields in the GUI presented to the User.
9.6.2
Wiremap LIS
The user for this type of v7 client will be the "administrator" of the wiremap LIS installation.
The administrator will need to validate addresses when the LIS is first installed. Whenever new
physical ports are wired, the administrator may need to validate addresses for those ports. Also
addresses will need to be re-validated on a periodic basis.
This solution assumes that the LIS presents web pages as the GUI to the LIS administrator.
Recommendation: The form presented to the LIS administrator should have distinct fields for
each part of the address, and those fields should match the fields in the underlying v7 messages.
Recommendation: The form should use drop-down menus for fields where the v7 interface
suggests the clients limit the data they send to relatively few values.
For example, if the v7 interface says that clients should limit the values submitted for
directionals to one of [e.g., N, S, E, W, NE, NW, SE, SW] it's best to use a drop-down menu on
the web page forms presented to the LIS administrator. Using drop-down menus helps minimize
the round-trip interactions required of the LIS administrator to validate an address.
Recommendation: For fields where the v7 interface suggests the clients limit the data they send
to a large but well known set of values, those fields should be validated prior to sending v7
messages.
For example, if the v7 interface says that clients should limit the values for submitted street
suffixes to those listed in country-specific Postal Standards, it would be impractical to try to
populate a web form drop-down with so many values. So it would be better to allow the LIS
administrator to enter suffixes free-form in a suffix field. Because the list is well known, the LIS
should validate the street suffix prior to sending a v7 message.
These validations could be client-side javascript, or validations running within the LIS web
server prior to sending the v7 message. The result of a validation should be a suggestion to
change the suffix prior to submitting for full validation. The LIS administrator should always be
able to proceed even if they don't accept this suggestion.
Version 2, (Board Approval Date)
It is best for the LIS v7 implementation to do these types of simple validations, because the VDB
is not required to suggest alternatives. By doing these validations and making suggestions up
front, the LIS can insure a better user experience for the LIS administrator.
Recommendation: When the v7 response contains address alternatives, the GUI should display
the alternatives in the same order, indicating the first alternative is likely the best choice.
9.7
CS/Proxy
Redirect
Server
Routing
Proxy
VPC
ERDB
ESGW
SR
100ms
50ms
50ms
200ms
200ms
50ms
50ms
l.
VEP
0
0ms
CS/Proxy
RS
1
100ms
100ms
75ms
2
275ms
100ms
100ms
4
775ms
5
975ms
100ms
100ms
25ms
ERDB
VPC
RP
100ms
ESGW
SR
PSAP
3
475ms
200ms
100ms
6
1.1s
100ms
1 sec IP Latency
50ms
6a
2.1s
100ms
ISUP
7
2.25s
50ms
50ms
2 secs
2 secs
CAMA
50ms
7
4.15s
2 secs
0
0ms
1
100ms
100ms
2
275ms
75ms
100ms
3
400ms
25ms
100ms
100ms
6
1.1s
7
1.225s
100ms
5
900ms
200ms
100ms
100ms
100ms
25ms
8
1.35s
100ms
1 sec IP Latency
50ms
8a
2.35s
100ms
ISUP
9
2.50s
50ms
50ms
2 secs
2 secs
CAMA
50ms
9
4.40s
2 secs
0
0ms
100ms
1
100ms
75ms
8
6.20s
4
600ms
100ms
25ms
8
4.30s
2
275ms
100ms
25ms
3
400ms
100ms
100ms
100ms
5
900ms
6
1.1s
25ms
100ms
10
4.55s
10
6.45s
4
600ms
200ms
100ms
100ms
7
1.225s
100ms
1 sec IP Latency
50ms
ISUP
7a
2.225s
100ms
8
2.375s
50ms
50ms
CAMA
2 secs
2 secs
8
4.25s
50ms
2 secs
9
4.425s
9
6.325s
M2. CS timer for CS to VPC (v2) 4.6 seconds, maximum wait for response from VPC. If this
timer expires, the CS may select a contingency routing scenario, through a PSTN gateway
for example. Tearing down the call based on this timer is discouraged.
M3. RS timer for RS to VPC (v2) 4.35 seconds, maximum wait time for response from VPC.
If this timer expires, the RS shall return an error code over the v5 interface so the CS could
invoke a contingency routing scenario, through a PSTN Gateway for example. Tearing
down the call based on this timer is discouraged.
M4. RP timer for RP to VPC (v2) 4.475 seconds, maximum wait for response from VPC. If
this timer expires, the RP may select a contingency routing scenario, through a PSTN
gateway for example. Tearing down the call based on this timer is discouraged.
M5. CS timer for CS to RS (v5) 4.6 seconds, maximum wait for response from RS, including
VPC and ERDB interactions. If this timer expires, the CS may select a contingency routing
scenario, through a PSTN gateway for example. Tearing down the call based on this timer is
discouraged.
M6. VPC timer for VPC to ERDB (v8) 1.35 seconds, maximum wait for each ERDB query.
If this timer expires, the VPC shall retry the ERDB query until timer M7 expires.
M7. VPC timer (v8) 4.05 seconds, maximum overall wait time for any interactive responses
between a VPC and ERDB(s). If this timer expires, the VPC shall send an error message
(5XX) to the requesting entity (CS, RS or RP) over the v2 interface. The routing entity may
then invoke a contingency routing scenario, through a PSTN gateway for example. Tearing
down the call based on this timer is discouraged.
Average Expected Call Setup Times:
9.8
This Appendix provides a list of issues that are still under consideration in the VoIP Migratory
Work Group. The resolution of these issues may result in revisions to the i2 solution document.
The issues that are currently on the VoIP Migratory group agenda as potential topics for further
investigation are as follows :
10 Previous Acknowledgments
Version 1, Approval Date, 12/16/2005
Members:
Nate Wilcox VoIP/Packet Technical
Committee Chair
Anand Akundi Work Group Leader and
Technical Editor
Nate Wilcox VoIP/Packet Technical Chair
Delaine Arnold
Ric Atkins
Erica Aubut
Tim Barry
Marc Berryman
Paul Binder
Patty Bluhm
Dean Bordens
Tom Breen
Tom Browne
Guy Caron
Larry Ciesla
Martin Dawson
Carol DeFazio
Martin Dolly
Jerry Eisner
Tom Hicks
Bill Horne
Dick Khan
Marc Linsner
Bill Marczac
Roger Marshall
Jeff Martin
Ken Maynard
Paul Mallett
Patti McCalmont
Dave Morris
Theresa Reese
Brian Rosen
John Rosenberg
John Savaglio
Carl Smith
Version 2, (Board Approval Date)
Company
MicroData
Telcordia Technologies
MircoData
Arnold 9-1-1 Consulting
Tarrant County 9-1-1 District
State of Vermont 9-1-1
AT&T
Greater Harris County 9-1-1
T-Mobile
HBF Group
AT&T
AT&T
HBF Group
Bell Canada
Intrado
Andrew Corporation
Telcordia Technologies
ATT
Intrado
Intrado
Tarrant County 9-1-1
AT&T
Cisco
AT&T
TCS
TCS
Bexar Metro 9-1-1 Metro District
CSEC
Intrado
Verizon
Telcordia Technologies
Neustar
Lucent
AT&T
Intrado
Page 246 of 247
Paul Stoffels
Maureen Stork
Chuck Thompson
Larry Truesdale
Greg Welenson
James Winterbottom
AT&T
Verizon Business
C.P. Thompson Limited
Nortel Networks
Vonage
Andrew Corporation