diff options
Diffstat (limited to 'doc/rfc/rfc6443.txt')
-rw-r--r-- | doc/rfc/rfc6443.txt | 2131 |
1 files changed, 2131 insertions, 0 deletions
diff --git a/doc/rfc/rfc6443.txt b/doc/rfc/rfc6443.txt new file mode 100644 index 0000000..b5efce8 --- /dev/null +++ b/doc/rfc/rfc6443.txt @@ -0,0 +1,2131 @@ + + + + + + +Internet Engineering Task Force (IETF) B. Rosen +Request for Comments: 6443 NeuStar +Category: Informational H. Schulzrinne +ISSN: 2070-1721 Columbia U. + J. Polk + Cisco Systems + A. Newton + TranTech/MediaSolv + December 2011 + + + Framework for Emergency Calling Using Internet Multimedia + +Abstract + + The IETF has standardized various aspects of placing emergency calls. + This document describes how all of those component parts are used to + support emergency calls from citizens and visitors to authorities. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Not all documents + approved by the IESG are a candidate for any level of Internet + Standard; see Section 2 of RFC 5741. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc6443. + +Copyright Notice + + Copyright (c) 2011 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + + + + + +Rosen, et al. Informational [Page 1] + +RFC 6443 Emergency Call Framework December 2011 + + + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + +Table of Contents + + 1. Introduction ....................................................3 + 2. Terminology .....................................................6 + 3. Overview of How Emergency Calls Are Placed ......................8 + 4. Which Devices and Services Should Support Emergency Calls? .....12 + 5. Identifying an Emergency Call ..................................12 + 6. Location and Its Role in an Emergency Call .....................14 + 6.1. Types of Location Information .............................16 + 6.2. Location Determination ....................................17 + 6.2.1. User-Entered Location Information ..................17 + 6.2.2. Access Network "Wire Database" Location + Information ........................................18 + 6.2.3. End System Measured Location Information ...........19 + 6.2.4. Network Measured Location Information ..............19 + 6.3. Who Adds Location, Endpoint, or Proxy? ....................20 + 6.4. Location and References to Location .......................20 + 6.5. End System Location Configuration .........................21 + 6.6. When Location Should Be Configured ........................22 + 6.7. Conveying Location ........................................23 + 6.8. Location Updates ..........................................24 + 6.9. Multiple Locations ........................................24 + 6.10. Location Validation ......................................25 + 6.11. Default Location .........................................26 + 6.12. Location Format Conversion ...............................26 + 7. LIS and LoST Discovery .........................................26 + 8. Routing the Call to the PSAP ...................................27 + 9. Signaling of Emergency Calls ...................................29 + 9.1. Use of TLS ................................................29 + 9.2. SIP Signaling Requirements for User Agents ................30 + 9.3. SIP Signaling Requirements for Proxy Servers ..............30 + 10. Call Backs ....................................................30 + 11. Mid-Call Behavior .............................................31 + 12. Call Termination ..............................................31 + 13. Disabling of Features .........................................32 + 14. Media .........................................................32 + 15. Testing .......................................................32 + 16. Security Considerations .......................................33 + 17. Acknowledgments ...............................................33 + 18. Informative References ........................................34 + + + + + + + +Rosen, et al. Informational [Page 2] + +RFC 6443 Emergency Call Framework December 2011 + + +1. Introduction + + Requesting help in an emergency using a communications device such as + a telephone (landline or mobile) is an accepted practice in many + parts of the world. As communications devices increasingly utilize + the Internet to interconnect and communicate, users will expect to + use such devices to request help. This document describes + establishment of a communications session by a user to a "Public + Safety Answering Point" (PSAP), that is, a call center established by + response agencies to accept emergency calls. Such citizen-/ + visitor-to-authority calls can be distinguished from those that are + created by responders (authority-to-authority) using public + communications infrastructure often involving some kind of priority + access as defined in Emergency Telecommunications Service (ETS) in IP + Telephony [RFC4190]. They can also be distinguished from emergency + warning systems that are authority-to-citizen. + + Supporting emergency calling requires cooperation by a number of + elements, their vendors, and service providers. This document + discusses how end devices and applications create emergency calls, + how access networks supply location for some of these devices, how + service providers assist the establishment and routing, and how PSAPs + receive calls from the Internet. + + The emergency response community will have to upgrade their + facilities to support a wider range of communications services, but + cannot be expected to handle wide variations in device and service + capability. New devices and services are being made available that + could be used to make a request for help that are not traditional + telephones, and users are increasingly expecting to use them to place + emergency calls. However, many of the technical advantages of + Internet multimedia require re-thinking the traditional emergency + calling architecture. This challenge also offers an opportunity to + improve the operation of emergency calling technology, while + potentially lowering its cost and complexity. + + It is beyond the scope of this document to enumerate and discuss all + the differences between traditional (Public Switched Telephone + Network) and IP-based telephony, but calling on the Internet is + characterized by: + + o interleaving over the same infrastructure of a wider variety of + services; + + o separation of the access provider from the application provider; + + o media other than voice (for example, video and text in several + forms); + + + +Rosen, et al. Informational [Page 3] + +RFC 6443 Emergency Call Framework December 2011 + + + o potential mobility of all end systems, including endpoints + nominally thought of as fixed systems and not just those using + radio access technology. For example, consider a wired phone + connected to a router using a mobile data network such as + Evolution Data Optimized (EV-DO) as an uplink. + + This document focuses on how devices using the Internet can place + emergency calls and how PSAPs can handle Internet multimedia + emergency calls natively, rather than describing how circuit-switched + PSAPs can handle Voice over IP (VoIP) calls. In many cases, PSAPs + making the transition from circuit-switched interfaces to packet- + switched interfaces may be able to use some of the mechanisms + described here, in combination with gateways that translate packet- + switched calls into legacy interfaces, e.g., to continue to be able + to use existing call taker equipment. There are many legacy + telephone networks that will persist long after most systems have + been upgraded to IP origination and termination of emergency calls. + Many of these legacy systems route calls based on telephone numbers. + Gateways and conversions between existing systems and newer systems + defined by this document will be required. Since existing systems + are governed primarily by local government regulations and national + standards, the gateway and conversion details will be governed by + national standards and thus are out of scope for this document. + + Existing emergency call systems are organized locally or nationally; + there are currently few international standards. However, the + Internet crosses national boundaries, and thus Internet standards are + required. To further complicate matters, VoIP endpoints can be + connected through tunneling mechanisms such as virtual private + networks (VPNs). Tunnels can obscure the identity of the actual + access network that knows the location. This significantly + complicates emergency calling, because the location of the caller and + the first element that routes emergency calls can be on different + continents, with different conventions and processes for handling of + emergency calls. + + The IETF has historically not created national variants of its + standards. Thus, this document attempts to take into account best + practices that have evolved for circuit-switched PSAPs, but it makes + no assumptions on particular operating practices currently in use, + numbering schemes, or organizational structures. + + This document discusses the use of the Session Initiation Protocol + (SIP) [RFC3261] by PSAPs and calling parties. While other inter- + domain call signaling protocols may be used for emergency calling, + SIP is ubiquitous and possesses the proper support of this use case. + Only protocols such as H.323, XMPP/Jingle, ISUP, and SIP are suitable + for inter-domain communications, ruling out Media Gateway Controller + + + +Rosen, et al. Informational [Page 4] + +RFC 6443 Emergency Call Framework December 2011 + + + protocols such as the Media Gateway Control Protocol (MGCP) or H.248/ + Megaco. The latter protocols can be used by the enterprise or + carrier placing the call, but any such call would reach the PSAP + through a media gateway controller, similar to how inter-domain VoIP + calls would be placed. Other signaling protocols may also use + protocol translation to communicate with a SIP-enabled PSAP. Peer- + to-peer SIP (p2psip) is not considered in this document. + + Existing emergency services rely exclusively on voice and + conventional text telephony ("TTY") media streams. However, more + choices of media offer additional ways to communicate and evaluate + the situation as well as to assist callers and call takers in making + and handling emergency calls, respectively. For example, instant + messaging and video could improve the ability to communicate and + evaluate the situation and to provide appropriate instruction prior + to arrival of emergency crews. Thus, the architecture described here + supports the creation of sessions of any media type, negotiated + between the caller and PSAP using existing SIP mechanisms [RFC3264]. + + This document focuses on the case in which all three steps in the + emergency calling process -- location configuration, call routing, + and call placement -- can be and are performed by the calling + endpoint, with the endpoint's Access Service Provider supporting the + process by providing location information. In this case, calls may + be routed via an application-layer Communications Service Provider + (e.g., a Voice Service Provider) but need not be. The underlying + protocols can also be used to support other models in which parts of + the process are delegated to the Communications Service Provider. + This document does not address in detail either these models or + interoperability issues between them and the model described here. + + Since this document is a framework document, it does not include + normative behavior. [PHONEBCP] describes the best current practice + for this subject and contains normative language for devices as well + as access and calling network elements. + + Supporting emergency calling does not require any specialized SIP + header fields, request methods, status codes, message bodies, or + event packages, but it does require that existing mechanisms be used + in certain specific ways, as described below. User agents (UAs) + unaware of the recommendations in this document may be able to place + emergency calls, but functionality may be impaired. For example, if + the UA does not implement the location mechanisms described, an + emergency call may not be routed to the correct PSAP, and if the + caller is unable to supply his exact location, dispatch of emergency + responders may be delayed. Suggested behavior for both endpoints and + servers is provided. + + + + +Rosen, et al. Informational [Page 5] + +RFC 6443 Emergency Call Framework December 2011 + + + From the point of view of the PSAP, three essential elements + characterize an emergency call: + + o The call is routed to the most appropriate PSAP, based primarily + on the location of the caller. + + o The PSAP must be able to automatically obtain the location of the + caller with sufficient accuracy to dispatch a responder to help + the caller. + + o The PSAP must be able to re-establish a session to the caller if + for any reason the original session is disrupted. + +2. Terminology + + This document uses terms from [RFC3261], [RFC5222], and [RFC5012]. + In addition, the following terms are used: + + Access network: The access network supplies IP packet service to an + endpoint. Examples of access networks include digital subscriber + lines (DSLs), cable modems, IEEE 802.11, WiMaX, enterprise local + area networks, and cellular data networks. + + Confidence: Confidence is an estimate indicating how sure the + measuring system is that the actual location of the endpoint is + within the bounds defined by the uncertainty value, expressed as a + percentage. For example, a value of 90% indicates that the actual + location is within the uncertainty nine times out of ten. + + Dispatch location: The dispatch location is the location used for + dispatching responders to the person in need of assistance. The + dispatch location must be sufficiently precise to easily locate + the caller; typically, it needs to be more accurate than the + routing location. + + Location configuration: During location configuration, an endpoint + learns its physical location. + + Location Configuration Protocol (LCP): A protocol used by an + endpoint to learn its location. + + Location conveyance: Location conveyance delivers location + information to another element. + + + + + + + + +Rosen, et al. Informational [Page 6] + +RFC 6443 Emergency Call Framework December 2011 + + + Location determination: Location determination finds where an + endpoint is physically located. For example, the endpoint may + contain a Global Navigation Satellite System (GNSS) receiver used + to measure its own location or the location may be determined by a + network administrator using a wiremap database. + + Location Information Server (LIS): A Location Information Server + stores location information for retrieval by an authorized entity. + + Mobile device: A mobile device is a user agent that may change its + physical location and possibly its network attachment point during + an emergency call. + + National Emergency Number Association (NENA): The National Emergency + Number Association is an organization of professionals to "foster + the technological advancement, availability and implementation of + a universal emergency telephone number system in North America". + It develops emergency calling specifications and procedures. + + Nomadic device (user): A nomadic user agent is connected to the + network temporarily, for relatively short durations, but does not + move significantly during the emergency call. Examples include a + laptop using an IEEE 802.11 hotspot or a desk IP phone that is + moved occasionally from one cubicle to another. + + Physical location: A physical location describes where a person or + device is located in physical space, described by a coordinate + system. It is distinguished from the network location, described + by a network address. + + Public Safety Answering Point (PSAP): A PSAP is a call center that + answers emergency calls. + + Routing location: The routing location of a device is used for + routing an emergency call and may not be as precise as the + dispatch location. + + Stationary device: An stationary device is not mobile and is + connected to the network at a fixed, long-term-stable physical + location. Examples include home PCs or pay phones. + + Uncertainty: Uncertainty is an estimate, expressed in a unit of + length, indicating the diameter of a circle that contains the + endpoint with the probability indicated by the confidence value. + + + + + + + +Rosen, et al. Informational [Page 7] + +RFC 6443 Emergency Call Framework December 2011 + + +3. Overview of How Emergency Calls Are Placed + + An emergency call can be distinguished (Section 5) from any other + call by a unique service URN [RFC5031] that is placed in the call + setup signaling when a home or visited emergency dial string is + detected. Because emergency services are local to specific + geographic regions, a caller obtains his location (Section 6) prior + to making emergency calls. To get this location, either a form of + measuring, for example, GNSS (Section 6.2.3) is deployed or the + endpoint is configured (Section 6.5) with its location from the + access network's Location Information Server (LIS) using a Location + Configuration Protocol (LCP). The location is conveyed (Section 6.7) + in the SIP signaling with the call. The call is routed (Section 8) + based on location using the Location-to-Service Translation (LoST) + protocol [RFC5222], which maps a location to a set of PSAP URIs. + Each URI resolves to a PSAP or an Emergency Services Routing Proxy + (ESRP) that serves as an incoming proxy for a group of PSAPs. The + call arrives at the PSAP with the location included in the INVITE + request. + + The following is a quick overview for a typical Ethernet-connected + telephone using SIP signaling. It illustrates one set of choices for + various options presented later in this document. + + o The phone "boots" and connects to its access network. + + o The phone gets location via a Location Configuration Protocol + (LCP), for example, from the DHCP server in civic [RFC4776] and/or + geo [RFC6225] forms, a HTTP-Enabled Location Delivery (HELD) + server [RFC5985] or the first-level switch's Link-Layer Discovery + Protocol (LLDP) server [LLDP]. + + o The phone obtains the local emergency dial string(s) from the LoST + [RFC5222] server for its current location. It also receives and + caches the PSAP URI obtained from the LoST server. + + o Some time later, the user places an emergency call. The phone + recognizes an emergency call from the dial strings and uses the + "urn:service:sos" [RFC5031] URN to mark an emergency call. + + o It refreshes its location via DHCP and updates the PSAP's URI by + querying the LoST mapping server with its location. + + o It puts its location in the SIP INVITE request in a Geolocation + header [RFC6442] and forwards the call using its normal outbound + call processing, which commonly involves an outbound proxy. + + + + + +Rosen, et al. Informational [Page 8] + +RFC 6443 Emergency Call Framework December 2011 + + + o The proxy recognizes the call as an emergency call and routes the + call using normal SIP routing mechanisms to the URI specified. + + o The call routing commonly traverses an incoming proxy server + (ESRP) in the emergency services network. That proxy then routes + the call to the PSAP. + + o The call is established with the PSAP and mutually agreed upon + media streams are created. + + o The location of the caller is displayed to the call taker. + + Configuration Servers + . . . . . . . . . . . . . . . . . + . . + . +--------+ +----------+ . + . +--------+ | +----------+ | . + . | LIS | | | SIP | | . + . | |-+ | Registrar|-+ . + . +--------+ +----------+ . + . ^ ^ . + . . | . . . . . . . | . . . . . . + | | + |[M1][M4] |[M2] + | | +--------+ + |+--------------+ +--------+ | + || | LoST | | + ||+-------------------->| Servers|-+ + ||| [M3][M5] +--------+ +-------+ + ||| | PSAP2 | + ||| +-------+ + ||| + ||| [M6] +-------+ [M7]+------+ [M8]+-------+ + Alice ------>| Proxy |---->| ESRP |---->| PSAP1 |-----> Call Taker + +-------+ +------+ +-------+ + + +-------+ + | PSAP3 | + +-------+ + + Figure 1: Emergency Call Component Topology + + + + + + + + + + +Rosen, et al. Informational [Page 9] + +RFC 6443 Emergency Call Framework December 2011 + + + The typical message flow for this example using Alice as the caller: + + [M1] Alice -> LIS: LCP Request(s) (ask for location) + LIS -> Alice: LCP Reply(s) (replies with location) + [M2] Alice -> Registrar: SIP REGISTER + Registrar -> Alice: SIP 200 OK (REGISTER) + [M3] Alice -> LoST Server: Initial LoST Query (contains location) + Lost Server -> Alice: Initial LoST Response (contains + PSAP-URI and dial string) + + Some time later, Alice dials or otherwise initiates an emergency call: + + [M4] Alice -> LIS: LCP Request (updates location) + LIS -> Alice: LCP Reply (replies with location) + [M5] Alice -> LoST Server: Update LoST Query (contains location) + Lost Server -> Alice: LoST Response (contains PSAP-URI) + [M6] Alice -> Outgoing Proxy: SIP INVITE (contains service URN, + Location and PSAP URI) + [M7] Outgoing Proxy -> ESRP: SIP INVITE (contains service URN, + Location and PSAP URI) + [M8] ESRP -> PSAP: SIP INVITE (contains service URN, + Location and PSAP URI) + + The 200 OK response is propagated back from the PSAP to Alice and the + ACK response is propagated from Alice to the PSAP. + + Figure 2: Message Flow + + Figure 1 shows emergency call component topology and the text above + shows call establishment. These include the following components: + + o Alice - the user of a UA that places the emergency call. + + o Configuration servers - Servers providing Alice's UA its IP + address and other configuration information, perhaps including + location-by-value or location-by-reference. Configuration servers + also may include a SIP registrar for Alice's UA. Most SIP UAs + will register, so it will be a common scenario for UAs that make + emergency calls to be registered with such a server in the + originating calling network. In most cases, a UA would have to + register in order for the PSAP to be able to call it back after an + emergency call has been completed. All the configuration messages + are labeled M1 through M3, but could easily require more than + three messages to complete. + + + + + + + +Rosen, et al. Informational [Page 10] + +RFC 6443 Emergency Call Framework December 2011 + + + o LoST server - Processes the LoST request for location plus a + service URN to a PSAP-URI, either for an initial request from a UA + or an in-call routing by the proxy server in the originating + network, or possibly by an ESRP. + + o ESRP - Emergency Services Routing Proxy, a SIP proxy server that + is the incoming call proxy in the emergency services domain. The + ESRP makes further routing decisions (e.g., based on PSAP state + and the location of the caller) to choose the actual PSAP that + handles the call. In some jurisdictions, this may involve another + LoST query. + + o PSAP - Emergency calls are answered at a Public Safety Answering + Point, a call center. + + Generally, Alice's UA either has location configured manually, has an + integral location measurement mechanism, or runs an LCP [M1] to + obtain location from the access (broadband) network. Then, Alice's + UA will most likely register [M2] with a SIP registrar. This allows + her to be contacted by other SIP entities. Next, her UA will perform + an initial LoST query [M3] to learn a URI for use if the LoST query + fails during an emergency call or to use to test the emergency call + mechanism. The LoST response contains the dial string for emergency + calls appropriate for the location provided. + + At some time after her device has booted, Alice initiates an + emergency call. She may do this by dialing an emergency dial string + valid for her current ("local") location or for her "home" location. + + The UA recognizes either dial string. The UA attempts to refresh its + location [M4], and with that location, to refresh the LoST mapping + [M5], in order to get the most accurate information to use for + routing the call. If the location request or the LoST request fails, + or takes too long, the UA uses values it has cached. + + The UA creates a SIP INVITE [M6] request that includes the location. + [RFC6442] defines a SIP Geolocation header that contains either a + location-by-reference URI or a [RFC3986] "cid:" URL indicating where + in the message body the location-by-value is. + + The INVITE message is routed to the ESRP [M7], which is the first + inbound proxy for the emergency services domain. This message is + then routed by the ESRP towards the most appropriate PSAP for Alice's + location [M8], as determined by the location and other information. + + A proxy in the PSAP chooses an available call taker and extends the + call to its UA. + + + + +Rosen, et al. Informational [Page 11] + +RFC 6443 Emergency Call Framework December 2011 + + + The 200 OK response to the INVITE request traverses the path in + reverse, from call taker UA to PSAP proxy to ESRP to originating + network proxy to Alice's UA. The ACK request completes the call + setup and the emergency call is established, allowing the PSAP call + taker to talk to Alice about Alice's emergency. + +4. Which Devices and Services Should Support Emergency Calls? + + Current PSAPs support voice calls and real-time text calls placed + through PSTN facilities or systems connected to the PSTN. However, + future PSAPs will support Internet connectivity and a wider range of + media types and provide higher functionality. In general, if a user + could reasonably expect to be able to place a call for help with the + device, then the device or service should support emergency calling. + Certainly, any device or service that looks like and works like a + telephone (wired or mobile) should support emergency calling, but + increasingly, users have expectations that other devices and services + should work. + + Devices that create media sessions and exchange audio, video, and/or + text and that have the capability to establish sessions to a wide + variety of addresses and communicate over private IP networks or the + Internet should support emergency calls. + + Traditionally, enterprise support of emergency calling is provided by + the telephony service provider to the enterprise. In some more + recent systems, the enterprise Private Branch Exchange (PBX) assists + emergency calling by providing more fine-grained location in larger + enterprises. In the future, the enterprise may provide the + connection to emergency services itself, not relying on the telephony + service provider. + +5. Identifying an Emergency Call + + Using the PSTN, emergency help can often be summoned by dialing a + nationally designated, widely known number, regardless of where the + telephone was purchased. The appropriate number is determined by the + infrastructure to which the telephone is connected. However, this + number differs between localities, even though it is often the same + for a country or region, as it is in many countries in the European + Union. In some countries, there is only one uniform digit sequence + that is used for all types of emergencies. In others, there are + several sequences that are specific to the type of responder needed, + e.g., one for police, another for fire. For end systems, on the + other hand, it is desirable to have a universal identifier, + independent of location, to allow the automated inclusion of location + + + + + +Rosen, et al. Informational [Page 12] + +RFC 6443 Emergency Call Framework December 2011 + + + information and to allow the device and other entities in the call + path to perform appropriate processing within the signaling protocol + in an emergency call setup. + + Since no such universal identifier existed, the overall emergency + calling architecture described here defines common emergency call + URNs [RFC5031]. When all emergency services use a single number, the + URN is "urn:service:sos". Users are not expected to "dial" an + emergency URN. Rather, appropriate emergency dial strings are + translated to corresponding service URNs, carried in the Request-URI + of the INVITE request. Such translation is best done by the + endpoint, because, among other reasons, emergency calls convey + location in the signaling but non-emergency calls normally do not. + If the device recognizes the emergency call, it can include location, + if known. A signaling intermediary (proxy server) can also recognize + emergency dial strings if the endpoint fails to do so. + + For devices that are mobile or nomadic, an issue arises of whether + the home or visited dial strings should be used. Many users would + prefer that their home dialing sequences work no matter where they + are. However, local laws and regulations may require that the + visited dialing sequence(s) work. Therefore, the visited dial string + must work. Devices may have a way to be configured or learn home + dial strings. + + LoST [RFC5222] provides the mechanism for obtaining the dialing + sequences for a given location. LoST servers must return dial + strings for emergency services. If the endpoint does not support the + translation of dial strings to service URNs, the dialing sequence + from the endpoint to its proxy is represented as a dial string + [RFC4967] and the outgoing proxy must recognize the dial string and + translate it to the equivalent service URN. To determine the local + emergency dial string, the proxy needs the location of the endpoint. + This may be difficult in situations where the user can roam or be + nomadic. Endpoint recognition of emergency dial strings is therefore + preferred. If a service provider is unable to guarantee that it can + correctly determine local emergency dial strings, wherever its + subscribers may be, then it is required that the endpoint do the + recognition. + + Note: The emergency call practitioners consider it undesirable to + have a single-button emergency call user interface element. These + mechanisms tend to result in a very high rate of false or accidental + emergency calls. In order to minimize this issue, practitioners + recommend that devices should only initiate emergency calls based on + entry of specific emergency call dial strings. Speed dial mechanisms + may effectively create single-button emergency call invocation and + practitioners recommend they not be permitted. + + + +Rosen, et al. Informational [Page 13] + +RFC 6443 Emergency Call Framework December 2011 + + +6. Location and Its Role in an Emergency Call + + Location is central to the operation of emergency services. Location + is used for two purposes in emergency call handling: routing of the + call and dispatch of responders. It is frequently the case that the + callers reporting an emergency are unable to provide a unique, valid + location themselves. For this reason, location provided by the + endpoint or the access network is needed. For practical reasons, + each PSAP generally handles only calls for a certain geographic area, + with overload arrangements between PSAPs to handle each others' + calls. Other calls that reach it by accident must be manually + re-routed (transferred) to the more appropriate PSAP, increasing call + handling delay and the chance for errors. The area covered by each + PSAP differs by jurisdiction, where some countries have only a small + number of PSAPs, while others decentralize PSAP responsibilities to + the level of counties or municipalities. + + In most cases, PSAPs cover at least a city or town, but there are + some areas where PSAP coverage areas follow old telephone rate center + boundaries and may straddle more than one city. Irregular boundaries + are common, often due to historical reasons. Routing must be done + based on actual PSAP service boundaries -- the closest PSAP, or the + PSAP that serves the nominal city name provided in the location, may + not be the correct PSAP. + + Accuracy of routing location is a complex subject. Calls must be + routed quickly, but accurately, and location determination is often a + time/accuracy trade-off, especially with mobile devices or self- + measuring mechanisms. If a more accurate routing location is not + available, it is considered acceptable to base a routing decision on + an accuracy equal to the area of one sector of a mobile cell site. + + Routing to the most appropriate PSAP is always based on the location + of the caller, despite the fact that some emergency calls are placed + on behalf of someone else, and the location of the incident is + sometimes not the location of the caller. In some cases, there are + other factors that enter into the choice of the PSAP that gets the + call, such as time of day, caller media requests, language + preference, and call load. However, location of the caller is the + primary input to the routing decision. + + Many mechanisms used to locate a caller have a relatively long "cold + start" time. To get a location accurate enough for dispatch may take + as much as 30 seconds. This is too long to wait for emergencies. + Accordingly, it is common, especially in mobile systems, to use a + coarse location, for example, the cell site and sector serving the + call, for call-routing purposes, and then to update the location when + + + + +Rosen, et al. Informational [Page 14] + +RFC 6443 Emergency Call Framework December 2011 + + + a more precise value is known prior to dispatch. In this document, + we use "routing location" and "dispatch location" when the + distinction matters. + + Accuracy of dispatch location is sometimes determined by local + regulation, and is constrained by available technology. The actual + requirement is more stringent than available technology can deliver: + It is required that a device making an emergency call close to the + "demising" or separation wall between two apartments in a high-rise + apartment building report location with sufficient accuracy to + determine on what side of the wall it is. This implies perhaps a 3 + cm accuracy requirement. As of the date of this memo, assisted GNSS + uncertainty in mobile phones with 95% confidence cannot be relied + upon to be less than hundreds of meters. As technology advances, the + accuracy requirements for location will need to be tightened. Wired + systems using wire-tracing mechanisms can provide location to a wall + jack in specific room on a floor in a building, and may even specify + a cubicle or even smaller resolution. As this discussion + illustrates, emergency call systems demand the most stringent + location accuracy available. + + In Internet emergency calling, where the endpoint is located is + determined using a variety of measurement or wire-tracing methods. + Endpoints may be configured with their own location by the access + network. In some circumstances, a proxy server may insert location + into the signaling on behalf of the endpoint. The location is mapped + to the URI to send the call to, and the location is conveyed to the + PSAP (and other elements) in the signaling. The terms + "determination", "configuration", "mapping", and "conveyance" are + used for specific aspects of location handling in IETF protocols. + Likewise, we employ Location Configuration Protocols, Location + Mapping Protocols, and Location Conveyance Protocols for these + functions. + + This document provides guidance for generic network configurations + with respect to location. It is recognized that unique issues may + exist in some network deployments. The IETF will continue to + investigate these unique situations and provide further guidance, if + warranted, in future documents. + + + + + + + + + + + + +Rosen, et al. Informational [Page 15] + +RFC 6443 Emergency Call Framework December 2011 + + +6.1. Types of Location Information + + Location can be specified in several ways: + + Civic: Civic location information describes the location of a person + or object by a street address that corresponds to a building or + other structure. Civic location may include more fine-grained + location information such as floor, room, and cubicle. Civic + information comes in two forms: + + "Jurisdictional" refers to a civic location using actual + political subdivisions, especially for the community name. + + "Postal" refers to a civic location for mail delivery. The + name of the post office sometimes does not correspond to the + community name and a postal address may contain post office + boxes or street addresses that do not correspond to an actual + building. Postal addresses are generally unsuitable for + emergency call dispatch because the post office conventions + (for community name, for example) do not match those known by + the responders. The fact that they are unique can sometimes be + exploited to provide a mapping between a postal address and a + civic address suitable to which to dispatch a responder. In + IETF location protocols, there is an element (Postal Community + Name) that can be included in a location to provide the post + office name as well as the actual jurisdictional community + name. There is also an element for a postal code. There is no + other accommodation for postal addresses in these protocols. + + Geospatial (geo): Geospatial addresses contain longitude, latitude, + and altitude information based on an understood datum and earth + shape model (datum). While there have been many datums developed + over time, most modern systems are using or moving towards the + WGS84 [WGS84] datum. + + Cell tower/sector: Cell tower/sector is often used for identifying + the location of a mobile handset, especially for routing of + emergency calls. Cell tower and sectors identify the cell tower + and the antenna sector that a mobile device is currently using. + Traditionally, the tower location is represented as a point chosen + to be within a certain PSAP service boundary that agrees to take + calls originating from that tower/sector, and routing decisions + are made on that point. Cell tower/sector information could also + be represented as an irregularly shaped polygon of geospatial + coordinates reflecting the likely geospatial location of the + mobile device. Whatever representation is used must route + correctly in the LoST database, where "correct" is determined by + local PSAP management. + + + +Rosen, et al. Informational [Page 16] + +RFC 6443 Emergency Call Framework December 2011 + + + In IETF protocols, both civic and geospatial forms are supported. + The civic forms include both postal and jurisdictional fields. A + cell tower/sector can be represented as a geo point or polygon or + civic location. Other forms of location representation must be + mapped into either a geo or civic value for use in emergency calls. + + For emergency call purposes, conversion of location information from + civic to geo or vice versa prior to conveyance is not desirable. The + location should be sent in the form it was determined. Conversion + between geo and civic requires a database. Where PSAPs need to + convert from whatever form they received to another for responder + purposes, they have a suitable database. However, if a conversion is + done before the PSAP's, and the database used is not exactly the same + one the PSAP uses, the double conversion has a high probability of + introducing an error. + +6.2. Location Determination + + As noted above, location information can be entered by the user or + installer of a device ("manual configuration"), measured by the end + system, be delivered to the end system by some protocol or measured + by a third party, and be inserted into the call signaling. + + In some cases, an entity may have multiple sources of location + information, possibly some that are partially contradictory. This is + particularly likely if the location information is determined both by + the end system and a third party. Although self-measured location + (e.g., GNSS) is attractive, location information provided by the + access network could be much more accurate, and more reliable in some + environments such as high-rise buildings in dense urban areas. + + The closer an entity is to the source of location, the more likely it + is able to determine which location is most appropriate for a + particular purpose when there is more than one location determination + for a given endpoint. In emergency calling, the PSAP is the least + likely to be able to appropriately choose which location to use when + multiple conflicting locations are presented to it. While all + available locations can be sent towards the PSAP, the order of the + locations should be the sender's best attempt to guide the recipient + of which one(s) to use. + +6.2.1. User-Entered Location Information + + Location information can be maintained by the end user or the + installer of an endpoint in the endpoint itself, or in a database. + + + + + + +Rosen, et al. Informational [Page 17] + +RFC 6443 Emergency Call Framework December 2011 + + + Location information routinely provided by end users is almost always + less reliable than measured or wire database information, as users + may mistype location information or may enter civic address + information that does not correspond to a recognized (i.e., valid, + see Section 6.10) address. Users can forget to change the data when + the location of a device changes. + + However, there are always a small number of cases where the automated + mechanisms used by the access network to determine location fail to + accurately reflect the actual location of the endpoint. For example, + the user may deploy his own WAN behind an access network, effectively + removing an endpoint some distance from the access network's notion + of its location. To handle these exceptional cases, there must be + some mechanism provided to manually provision a location for an + endpoint by the user or by the access network on behalf of a user. + The use of the mechanism introduces the possibility of users falsely + declaring themselves to be somewhere they are not. However, this is + generally not a problem in practice. Commonly, if an emergency + caller insists that he is at a location different from what any + automatic location determination system reports he is, responders + will always be sent to the user's self-declared location. + +6.2.2. Access Network "Wire Database" Location Information + + Location information can be maintained by the access network, + relating some form of identifier for the end subscriber or device to + a location database ("wire database"). In enterprise LANs, wiremap + databases map Ethernet switch ports to building locations. In DSL + installations, the local telephone carrier maintains a mapping of + wire-pairs to subscriber addresses. + + Accuracy of location historically has been to a street-address level. + However, this is not sufficient for larger structures. The Presence + Information Data Format (PIDF) Location Object [RFC4119], extended by + [RFC5139] and [RFC5491], permits interior building, floor, and room + and even finer specification of location within a street address. + When possible, interior location should be supported. + + The threshold for when interior location is needed is approximately + 650 square meters. This value is derived from US fire brigade + recommendations of spacing of alarm pull stations. However, interior + space layout, construction materials, and other factors should be + considered. + + Even for IEEE 802.11 wireless access points, wire databases may + provide sufficient location resolution. The location of the access + point as determined by the wiremap may be supplied as the location + for each of the clients of the access point. However, this may not + + + +Rosen, et al. Informational [Page 18] + +RFC 6443 Emergency Call Framework December 2011 + + + be true for larger-scale systems such as IEEE 802.16 (WiMAX) and IEEE + 802.22 that typically have larger cells than those of IEEE 802.11. + The civic location of an IEEE 802.16 base station may be of little + use to emergency personnel, since the endpoint could be several + kilometers away from the base station. + + Wire databases are likely to be the most promising solution for + residential users where a service provider knows the customer's + service address. The service provider can then perform address + validation (see Section 6.10), similar to the current system in some + jurisdictions. + +6.2.3. End System Measured Location Information + + Global Positioning System (GPS) and similar Global Navigation + Satellite Systems (e.g., GLONAS and Galileo) receivers may be + embedded directly in the end device. GNSS produces relatively high + precision location fixes in open-sky conditions, but the technology + still faces several challenges in terms of performance (time-to-fix + and time-to-first-fix), as well as obtaining successful location + fixes within shielded structures, or underground. It also requires + all devices to be equipped with the appropriate GNSS capability. + Many mobile devices require using some kind of "assist", that may be + operated by the access network (A-GPS) or by a government (WAAS). A + device may be able to use multiple sources of assist data. + + The GNSS satellites are active continuously; thus, location will + always be available as long as the device can "see" enough + satellites. However, mobile devices may not be able to afford the + power levels required to keep the measuring system active. In such + circumstances, when location is needed, the device has to start up + the measurement mechanism. Typically, this takes tens of seconds, + far too long to wait to be able to route an emergency call. For this + reason, devices that have end system measured location mechanisms but + need a cold start period lasting more than a couple seconds need + another way to get a routing location. Typically, this would be a + location associated with a radio link (cell tower/sector). + +6.2.4. Network Measured Location Information + + The access network may locate end devices. Techniques include + various forms of triangulation. Elements in the network + infrastructure triangulate end systems based on signal strength, + angle of arrival or time of arrival. Common mechanisms deployed + include the following: + + + + + + +Rosen, et al. Informational [Page 19] + +RFC 6443 Emergency Call Framework December 2011 + + + o Time Difference Of Arrival - TDOA + + o Uplink Time Difference Of Arrival - U-TDOA + + o Angle of Arrival - AOA + + o Radio Frequency (RF) fingerprinting + + o Advanced Forward Link Trilateration - AFLT + + o Enhanced Forward Link Trilateration - EFLT + + Sometimes multiple mechanisms are combined, for example A-GPS with + AFLT. + +6.3. Who Adds Location, Endpoint, or Proxy? + + The IETF emergency call architecture prefers endpoints to learn their + location and supply it on the call. Where devices do not support + location, proxy servers may have to add location to emergency calls. + Some calling networks have relationships with all access networks the + device may be connected to, and that may allow the proxy to + accurately determine the location of the endpoint. However, NATs and + other middleboxes often make it impossible to determine a reference + identifier the access network could provide to a LIS to determine the + location of the device. System designers are discouraged from + relying on proxies to add location. The technique may be useful in + some limited circumstances as devices are upgraded to meet the + requirements of this document, or where relationships between access + networks and calling networks are feasible and can be relied upon to + get accurate location. + + Proxy insertion of location complicates dial-string recognition. As + noted in Section 6, local dial strings depend on the location of the + caller. If the device does not know its own location, it cannot use + the LoST service to learn the local emergency dial strings. The + calling network must provide another way for the device to learn the + local dial string, and update it when the user moves to a location + where the dial string(s) change, or do the dial-string determination + itself. + +6.4. Location and References to Location + + Location information may be expressed as the actual civic or + geospatial value but can be transmitted as by value, i.e., wholly + contained within the signaling message, or by reference, i.e., as a + URI pointing to the value residing on a remote node waiting to be + dereferenced. + + + +Rosen, et al. Informational [Page 20] + +RFC 6443 Emergency Call Framework December 2011 + + + When location is transmitted by value, the location information is + available to entities in the call path. On the other hand, location + objects can be large and only represent a single snapshot of the + device's location. Location references are small and can be used to + represent a time-varying location, but the added complexity of the + dereference step introduces a risk that location will not be + available to parties that need it if the dereference transaction were + to fail. + +6.5. End System Location Configuration + + Unless a user agent has access to provisioned or locally measured + location information, it must obtain it from the access network. + There are several Location Configuration Protocols (LCPs) that can be + used for this purpose including DHCP, HELD, and LLDP: + + DHCP can deliver civic [RFC4776] or geospatial [RFC6225] + information. User agents need to support both formats. Note that + a user agent can use DHCP, via the DHCP REQUEST or INFORM + messages, even if it uses other means to acquire its IP address. + + HELD [RFC5985] can deliver a civic or geo location object, by + value or by reference, via a Layer 7 protocol. The query + typically uses the IP address of the requester as an identifier + and returns the location value or reference associated with that + identifier. HELD is typically carried in HTTP. + + Link-Layer Discovery Protocol [LLDP] with Media Endpoint Device + (MED) extensions [LLDP-MED] can be used to deliver location + information directly from the Layer 2 network infrastructure and + also supports both civic and geo formats identical in format to + DHCP methods. + + Each LCP has limitations in the kinds of networks that can reasonably + support it. For this reason, it is not possible to choose a single + mandatory-to-deploy LCP. For endpoints with common network + connections, such as an Ethernet jack or a WiFi connection, location + determination could easily fail unless every network supported every + protocol, or alternatively, every device supported every protocol. + For this reason, a mandatory-to-implement list of LCPs is established + in [PHONEBCP]. Every endpoint that could be used to place emergency + calls must implement all of the protocols on the list. Every access + network must deploy at least one of them. Since it is the + variability of the networks that prevent a single protocol from being + acceptable, it must be the endpoints that implement all of them, and + to accommodate a wide range of devices, networks must deploy at least + one of them. + + + + +Rosen, et al. Informational [Page 21] + +RFC 6443 Emergency Call Framework December 2011 + + + Often, network operators and device designers believe that they have + a simpler environment and some other network specific mechanism can + be used to provide location. Unfortunately, it is very rare to + actually be able to limit the range of devices that may be connected + to a network. For example, existing mobile networks are being used + to support routers and LANs behind the WAN connection of a wireless + data network, with Ethernet connected phones connected to that. It + is possible that the access network could support a protocol not on + the list and require every handset in that network to use that + protocol for emergency calls. However, the Ethernet-connected phone + will not be able to acquire location, and the user of the phone is + unlikely to be dissuaded from placing an emergency call on that + phone. The widespread availability of gateways, routers, and other + network-broadening devices means that indirectly connected endpoints + are possible on nearly every network. Network operators and vendors + are cautioned that shortcuts to meeting this requirement are seldom + successful. + + Location for non-mobile devices is normally expected to be acquired + at network attachment time and retained by the device. It should be + refreshed when the cached value expires. For example, if DHCP is the + acquisition protocol, refresh of location may occur when the IP + address lease is renewed. At the time of an emergency call, the + location should be refreshed, with the retained location used if the + location acquisition does not immediately return a value. Mobile + devices may determine location at network attachment time and + periodically thereafter as a backup in case location determination at + the time of call does not work. Mobile device location may be + refreshed when a Time-to-Live (TTL) expires or the device moves + beyond some boundaries (as provided by [RFC5222]). Normally, mobile + devices will acquire their location at call time for use in an + emergency call routing. See Section 6.8 for a further discussion on + location updates for dispatch location. + + There are many examples of endpoints that are user agent applications + running on a more general purpose device, such as a personal + computer. On some systems, Layer 2 protocols like DHCP and LLDP may + not be directly accessible to applications. It is desirable for an + operating system to have an API that provides the location of the + device for use by any application, especially those supporting + emergency calls. + +6.6. When Location Should Be Configured + + Devices should get routing location immediately after obtaining local + network configuration information. The presence of NAT and VPN + tunnels (that assign new IP addresses to communications) can obscure + identifiers used by LCPs to determine location, especially for HELD. + + + +Rosen, et al. Informational [Page 22] + +RFC 6443 Emergency Call Framework December 2011 + + + In some cases, such as residential NAT devices, the NAT is placed + between the endpoint and the access network demarcation point and + thus the IP address seen by the access network is the right + identifier for location of the residence. However, in many + enterprise environments, VPN tunnels can obscure the actual IP + address. Some VPN mechanisms can be bypassed so that a query to the + LCP can be designated to go through the direct IP path, using the + correct IP address, and not through the tunnel. In other cases, no + bypass is possible, but location can be configured before the VPN is + established. Of course, LCPs that use Layer 2 mechanisms (DHCP + location options and LLDP-MED) are usually immune from such problems + because they do not use the IP address as the identifier for the + device seeking location. + + It is desirable that routing location information be periodically + refreshed. A LIS supporting a million subscribers each refreshing + once per day would need to support a query rate of 1,000,000 / (24 * + 60 * 60) = 12 queries per second. For networks with mobile devices, + much higher refresh rates could be expected. + + It is desirable for routing location information to be requested + immediately before placing an emergency call. However, if there is + any significant delay in getting more recent location, the call + should be placed with the most recent location information the device + has. In mobile handsets, routing is often accomplished with the cell + site and sector of the tower serving the call, because it can take + many seconds to start up the location determination mechanism and + obtain an accurate location. + + There is a trade-off between the time it takes to get a routing + location and the accuracy (technically, confidence and uncertainty) + obtained. Routing an emergency call quickly is required. However, + if location can be substantially improved by waiting a short time + (e.g., for some sort of "quick (location) fix"), it is preferable to + wait. Three seconds, the current nominal time for a quick fix, is a + very long time add to post-dial delay. NENA recommends [NENAi3TRD] + that IP-based systems complete calls in two seconds from last dial + press to ring at the PSAP. + +6.7. Conveying Location + + When an emergency call is placed, the endpoint should include + location in the call signaling. This is referred to as "conveyance" + to distinguish it from "configuration". In SIP, the location + information is conveyed following the procedures in [RFC6442]. Since + + + + + + +Rosen, et al. Informational [Page 23] + +RFC 6443 Emergency Call Framework December 2011 + + + the form of the location information obtained by the acquisition + protocol may not be the same as the conveyance protocol uses (PIDF-LO + [RFC4119]), mapping by the endpoint from the LCP form to PIDF may be + required. + +6.8. Location Updates + + As discussed above, it may take some time for some measurement + mechanisms to get a location accurate enough for dispatch, and a + routing location with less accuracy may be provided to get the call + established quickly. The PSAP needs the dispatch location before it + sends the call to the responder. This requires an update of the + location. In addition, the location of some mobile callers, e.g., in + a vehicle or aircraft, can change significantly during the emergency + call. + + A PSAP has no way to request an update of a location provided by + value. If the User Agent Client (UAC) gets new location information, + it must signal the PSAP using a new INVITE or an UPDATE transaction + with a new Geolocation header field to supply the new location. + + With the wide variation in determination mechanisms, the PSAP does + not know when accurate location may be available. The preferred + mechanism is that the LIS notifies the PSAP when an accurate location + is available rather than requiring a poll operation from the PSAP to + the LIS. The SIP Presence subscription [RFC3856] provides a suitable + mechanism. + + When using a HELD dereference, the PSAP must specify the value + "emergencyDispatch" for the ResponseTime parameter. Since, + typically, the LIS is local relative to the PSAP, the LIS can be + aware of the update requirements of the PSAP. + +6.9. Multiple Locations + + Getting multiple locations all purported to describe the location of + the caller is confusing to all, and should be avoided. Handling + multiple locations at the point where a PIDF is created is discussed + in [RFC5491]. Conflicting location information is particularly + harmful if different routes (PSAPs) result from LoST queries for the + multiple locations. When they occur anyway, the general guidance is + that the entity earliest in the chain generally has more knowledge + than later elements to make an intelligent decision, especially about + which location will be used for routing. It is permissible to send + multiple locations towards the PSAP, but the element that chooses the + route must select exactly one location to use with LoST. + + + + + +Rosen, et al. Informational [Page 24] + +RFC 6443 Emergency Call Framework December 2011 + + + Guidelines for dealing with multiple locations are also given in + [RFC5222]. If a UA gets multiple locations, it must choose the one + to use for routing, but it may send all of the locations it has in + the signaling. If a proxy is inserting location and has multiple + locations, it must choose exactly one to use for routing and send it + as well as any other locations it has that correspond to this UA. + + The UA or proxy should have the ability to understand how and from + whom it learned its location, and should include this information in + the location objects that are sent to the PSAP. That labeling + provides the call taker with information to make decisions upon, as + well as guidance for, what to ask the caller and what to tell the + responders. + + Endpoints or proxies may be tempted to send multiple versions of the + same location. For example a database may be used to "geocode" or + "reverse geocode", that is, convert from civic to geo or vice versa. + It is very problematic to use derived locations in emergency calls. + The PSAP and the responders have very accurate databases that they + use to convert most commonly from a reported geo to a civic suitable + for dispatching responders. If one database is used to convert from, + say, civic to geo, and another converts from geo to civic, errors + will often occur where the databases are slightly different. Errors + of even a single house number are serious as it may lead first + responders to the wrong building. Derived locations should be marked + with a "derived" method token [RFC4119]. If an entity gets a + location that has a measured or other original method, and another + with a derived method, it must use the original value for the + emergency call. + +6.10. Location Validation + + Validation, in this context, means that there is a mapping from the + address to a PSAP and that the PSAP understands how to direct + responders to the location. It is recommended that location be + validated prior to a device placing an actual emergency call; some + jurisdictions require that this be done. + + Determining whether an address is valid can be difficult. There are, + for example, many cases of two names for the same street, or two + streets with the same name but different "suffixes" (Avenue, Street, + Circle) in a city. In some countries, the current system provides + validation. For example, in the United States of America, the Master + Street Address Guide (MSAG) records all valid street addresses and is + used to ensure that the service addresses in phone billing records + correspond to valid emergency service street addresses. Validation + is normally only a concern for civic addresses, although there could + + + + +Rosen, et al. Informational [Page 25] + +RFC 6443 Emergency Call Framework December 2011 + + + be some determination that a given geo is within at least one PSAP + service boundary; that is, a "valid" geo is one where there is a + mapping in the LoST server. + + LoST [RFC5222] includes a location validation function. Validation + is normally performed when a location is entered into a Location + Information Server. It should be confirmed periodically, because the + mapping database undergoes slow change and locations that previously + validated may eventually fail validation. Endpoints may wish to + validate locations they receive from the access network, and will + need to validate manually entered locations. Proxies that insert + location may wish to validate locations they receive from a LIS. + When the test functions (Section 15) are invoked, the location used + should be validated. + + When validation fails, the location given should not be used for an + emergency call, unless no other valid location is available. Bad + location is better than no location. If validation is completed when + location is first loaded into a LIS, any problems can be found and + fixed before devices could get the bad location. Failure of + validation arises because an error is made in determining the + location, although occasionally the LoST database is not up to date + or has faulty information. In either case, the problem must be + identified and should be corrected before using the location. + +6.11. Default Location + + Occasionally, the access network cannot determine the actual location + of the caller. In these cases, it must supply a default location. + The default location should be as accurate as the network can + determine. For example, in a cable network, a default location for + each Cable Modem Termination System (CMTS), with a representative + location for all cable modems served by that CMTS could be provided + if the network is unable to resolve the subscriber to anything more + precise than the CMTS. Default locations must be marked as such so + that the PSAP knows that the location is not accurate. + +6.12. Location Format Conversion + + The endpoint is responsible for mapping any form of location it + receives from an LCP into PIDF-LO form if the LCP did not directly + return a PIDF-LO. + +7. LIS and LoST Discovery + + Endpoints must be able to discover a LIS, if the HELD protocol is + used and a LoST server. DHCP options are defined for this purpose, + namely [RFC5986] and [RFC5223]. + + + +Rosen, et al. Informational [Page 26] + +RFC 6443 Emergency Call Framework December 2011 + + + Until such DHCP records are widely available, it may be necessary for + the service provider to provision a LoST server address in the + device. The endpoint can also do a DNS SRV query to find a LoST + server. In any environment, more than one of these mechanisms may + yield a LoST server, and they may be different. The recommended + priority is DHCP first, provisioned value second, and DNS SRV query + in the SIP domain third. + +8. Routing the Call to the PSAP + + Emergency calls are routed based on one or more of the following + criteria expressed in the call setup request (INVITE): + + Location: Since each PSAP serves a limited geographic region and + transferring existing calls delays the emergency response, calls + need to be routed to the most appropriate PSAP. In this + architecture, emergency call setup requests contain location + information, expressed in civic or geospatial coordinates, that + allows such routing. + + Type of emergency service: In some jurisdictions, emergency calls + for specific emergency services such as fire, police, ambulance, + or mountain rescue are directed to just those emergency-specific + PSAPs. This mechanism is supported by marking emergency calls + with the proper service identifier [RFC5031]. Even in single- + number jurisdictions, not all services are dispatched by PSAPs and + may need alternate URNs to route calls to the appropriate call + center. + + Media capabilities of caller: In some cases, emergency call centers + for specific caller media preferences, such as typed text or + video, are separate from PSAPs serving voice calls. ESRPs are + expected to be able to provide routing based on media. Also, even + if media capability does not affect the selection of the PSAP, + there may be call takers within the PSAP that are specifically + trained, e.g., in real-time text or sign language communications, + where routing within the PSAP based on the media offer would be + provided. + + Providing a URL to route emergency calls by location and by type of + service is the primary function LoST [RFC5222] provides. LoST + accepts a query with location (by-value) in either civic or geo form, + plus a service identifier, and returns a URI (or set of URIs) to + which to route the call. Normal SIP [RFC3261] routing functions are + used to resolve the URI to a next-hop destination. + + + + + + +Rosen, et al. Informational [Page 27] + +RFC 6443 Emergency Call Framework December 2011 + + + The endpoint can complete the LoST mapping from its location at boot + time, and periodically thereafter. It should attempt to obtain a + "fresh" location, and from that a current mapping when it places an + emergency call. If accessing either its location acquisition or its + mapping functions fail, it should use its cached value. The call + would follow its normal outbound call processing. + + Determining when the device leaves the area provided by the LoST + service can tax small mobile devices. For this reason, the LoST + server should return a simple (small number of points) polygon for + geospatial location. This can be a simple enclosing rectangle of the + PSAP service area when the reported point is not near an edge, or a + smaller polygonal edge section when the reported location is near an + edge. Civic location is uncommon for mobile devices, but reporting + that the same mapping is good within a community name, or even a + street, may be very helpful for WiFi connected devices that roam and + obtain civic location from the access point to which they are + connected. + + Networks that support devices that do not implement LoST mapping + themselves may need the outbound proxy do the mapping. If the + endpoint recognized the call was an emergency call, provided the + correct service URN and/or included location on the call in a + Geolocation header, a proxy server could easily accomplish the + mapping. + + However, if the endpoint did not recognize the call was an emergency + call, and thus did not include location, the proxy's task is more + difficult. It is often difficult for the calling network to + accurately determine the endpoint's location. The endpoint may have + its own location, but would not normally include it on the call + signaling unless it knew it was an emergency call. There is no + mechanism provided in [RFC6442] for a proxy to request the endpoint + supply its location, because that would open the endpoint to an + attack by any proxy on the path to get it to reveal location. The + proxy can attempt to redirect a call to the service URN, which, if + the device recognizes the significance, would include location in the + redirected call from the device. All network elements should detect + emergency calls and supply default location and/or routing if it is + not already present. + + The LoST server would normally be provided by the local emergency + authorities, although the access network or calling network might run + its own server using data provided by the emergency authorities. + Some enterprises may have local responders and call centers, and + could operate their own LoST server, providing URIs to in-house + "PSAPs". Local regulations might limit the ability of enterprises to + direct emergency calls to in-house services. + + + +Rosen, et al. Informational [Page 28] + +RFC 6443 Emergency Call Framework December 2011 + + + The ESRP, which is a normal SIP proxy server in the signaling path of + the call, may use a variety of PSAP state information, the location + of the caller, and other criteria to route onward the call to the + PSAP. In order for the ESRP to route on media choice, the initial + INVITE request has to supply an SDP offer. + +9. Signaling of Emergency Calls + +9.1. Use of TLS + + Best current practice for SIP user agents [RFC4504] including + handling of audio, video, and real-time text [RFC4103] should be + applied. As discussed above, location is carried in all emergency + calls in the call signaling. Since emergency calls carry privacy- + sensitive information, they are subject to the requirements for + geospatial protocols [RFC3693]. In particular, signaling information + should be carried in Transport Layer Security (TLS), i.e., in 'sips' + mode with a ciphersuite that includes strong encryption, such as AES. + There are exceptions in [RFC3693] for emergency calls. For example, + local policy may dictate that location is sent with an emergency call + even if the user's policy would otherwise prohibit that. + Nevertheless, protection from eavesdropping of location by encryption + should be provided. + + It is unacceptable to have an emergency call fail to complete because + a TLS connection was not created for any reason. Thus, the call + should be attempted with TLS, but if the TLS session establishment + fails, the call should be automatically retried without TLS. + [RFC5630] recommends that to achieve this effect, the target specify + a sip URI, but use TLS on the outbound connection. An element that + receives a request over a TLS connection should attempt to create a + TLS connection to the next hop. + + In many cases, persistent TLS connections can be maintained between + elements to minimize the time needed to establish them [RFC5626]. In + other circumstances, use of session resumption [RFC5077] is + recommended. IPsec [RFC4301] is an acceptable alternative to TLS + when used with an equivalent crypto suite. + + Location may be used for routing by multiple proxy servers on the + path. Confidentiality mechanisms such as Secure/Multipurpose + Internet Mail Extensions (S/MIME) encryption of SIP signaling + [RFC3261] cannot be used because they obscure location. Only hop-by- + hop mechanisms such as TLS should be used. Implementing location + conveyance in SIP mandates inclusion of TLS support. + + + + + + +Rosen, et al. Informational [Page 29] + +RFC 6443 Emergency Call Framework December 2011 + + +9.2. SIP Signaling Requirements for User Agents + + SIP UAs that recognize local dial strings, insert location, and + perform emergency call routing will create SIP INVITE messages with + the service URN in the Request-URI, the LoST-determined URI for the + PSAP in a Route header, and the location in a Geolocation header. + The INVITE request must also have appropriate callback identifiers + (in Contact and From headers). To enable media-sensitive routing, + the call should include a Session Description Protocol (SDP) offer + [RFC3264]. + + SIP caller preferences [RFC3841] can be used to signal how the PSAP + should handle the call. For example, a language preference expressed + in an Accept-Language header may be used as a hint to cause the PSAP + to route the call to a call taker who speaks the requested language. + SIP caller preferences may also be used to indicate a need to invoke + a relay service for communication with people with disabilities in + the call. + +9.3. SIP Signaling Requirements for Proxy Servers + + At least one SIP proxy server in the path of an emergency call must + be able to assist UAs that are unable to provide any of the location- + based routing steps and recognition of dial strings. A proxy can + recognize the lack of location awareness by the lack of a Geolocation + header. It can recognize the lack of dial-string recognition by the + presence of the local emergency call dial string in the From header + without the service URN being present. They should obtain the + location of the endpoint if possible, and use a default location if + they cannot, inserting it in a Geolocation header. They should query + LoST with the location and put the resulting URI in a route, with the + appropriate service URN in the Request-URI. In any event, they are + also expected to provide information for the caller using SIP + Identity or P-Asserted-Identity. It is often a regulatory matter + whether calls normally marked as anonymous are passed as anonymous + when they are emergency calls. Proxies must conform to the local + regulation or practice. + +10. Call Backs + + The call taker must be able to reach the emergency caller if the + original call is disconnected. In traditional emergency calls, + wireline and wireless emergency calls include a callback identifier + for this purpose. There are two kinds of call backs. When a call is + dropped, or the call taker realizes that some important information + is needed that it doesn't have, it must call back the device that + placed the emergency call. The PSAP, or a responder, may need to + call back the caller much later, and for that purpose, it wants a + + + +Rosen, et al. Informational [Page 30] + +RFC 6443 Emergency Call Framework December 2011 + + + normal SIP address of record (AOR). In SIP systems, the caller must + include a Contact header field in an emergency call containing a + globally routable URI, possibly a Globally Routable User Agent URI + (GRUU) [RFC5627]. This identifier would be used to initiate + callbacks immediately by the call taker if, for example, the call is + prematurely dropped. A concern arises with back-to-back user agents + (B2BUAs) that manipulate Contact headers. Such B2BUAs should always + include a Contact header that routes to the same device. + + In addition, a callback identifier as an address of record (AoR) must + be included either as the URI in the From header field [RFC3261] + verified by SIP Identity [RFC4474] or as a network-asserted URI + [RFC3325]. If the latter, the PSAP will need to establish a suitable + spec(t) with the proxies that send it emergency calls. This + identifier would be used to initiate a callback at a later time and + may reach the caller, not necessarily on the same device (and at the + same location) as the original emergency call as per normal SIP + rules. It is often a regulatory matter whether calls normally marked + as anonymous are passed as anonymous when they are emergency calls. + Proxies must conform to the local regulation or practice. + +11. Mid-Call Behavior + + Some PSAPs often include dispatchers, responders, or specialists on a + call. Some responders' dispatchers are not located in the primary + PSAP, the call may have to be transferred to another PSAP. Most + often, this will be an attended transfer, or a bridged transfer. + Therefore, a PSAP may need to a REFER request [RFC3515] a call to a + bridge for conferencing. Devices that normally involve the user in + transfer operations should consider the effect of such interactions + when a stressed user places an emergency call. Requiring user + interface manipulation during such events may not be desirable. + Relay services for communication with people with disabilities may be + included in the call with the bridge. The UA should be prepared to + have the call transferred (usually attended, but possibly blind) per + [RFC5359]. + +12. Call Termination + + It is undesirable for the caller to terminate an emergency call. A + PSAP terminates a call using the normal SIP call termination + procedures, i.e., with a BYE request. + + + + + + + + + +Rosen, et al. Informational [Page 31] + +RFC 6443 Emergency Call Framework December 2011 + + +13. Disabling of Features + + Certain features that can be invoked while a normal call is active + are not permitted when the call is an emergency call. Services such + as call waiting, call transfer, three-way calling, and hold should be + disabled. + + Certain features such as call forwarding can interfere with calls + from a PSAP and should be disabled. There is no way to reliably + determine a PSAP call back. A UA may be able to determine a PSAP + call back by examining the domain of incoming calls after placing an + emergency call and comparing that to the domain of the answering PSAP + from the emergency call. Any call from the same domain and directed + to the supplied Contact header or AoR after an emergency call should + be accepted as a callback from the PSAP if it occurs within a + reasonable time after an emergency call was placed. + +14. Media + + PSAPs should always accept RTP media streams [RFC3550]. + Traditionally, voice has been the only media stream accepted by + PSAPs. In some countries, text, in the form of Baudot codes or + similar tone encoded signaling within a voiceband is accepted ("TTY") + for persons who have hearing disabilities. Using SIP signaling + includes the capability to negotiate media. Normal SIP offer/answer + [RFC3264] negotiations should be used to agree on the media streams + to be used. PSAPs should accept real-time text [RFC4103]. All PSAPs + should accept G.711 A-law (and mu-law in North America) encoded voice + as described in [RFC3551]. Newer text forms are rapidly appearing, + with instant messaging now very common, PSAPs should accept IM with + at least "pager-mode" MESSAGE request [RFC3428] as well as Message + Session Relay Protocol [RFC4975]. Video media in emergency calling + is required to support Video Relay Service (sign language + interpretation) as well as modern video phones. + + It is desirable for media to be kept secure by the use of Secure RTP + [RFC3711], using DTLS [RFC5764] for keying. + +15. Testing + + Since the emergency calling architecture consists of a number of + pieces operated by independent entities, it is important to be able + to test whether an emergency call is likely to succeed without + actually occupying the human resources at a PSAP. Both signaling and + media paths need to be tested since NATs and firewalls may allow the + session setup request to reach the PSAP, while preventing the + exchange of media. + + + + +Rosen, et al. Informational [Page 32] + +RFC 6443 Emergency Call Framework December 2011 + + + [PHONEBCP] includes a description of an automated test procedure that + validates routing, signaling, and media path continuity. This test + should be used within some random interval after boot time, and + whenever the device location changes enough that a new PSAP mapping + is returned by the LoST server. + + The PSAP needs to be able to control frequency and duration of the + test, and since the process could be abused, it may temporarily or + permanently suspend its operation. + + There is a concern associated with testing during a so-called + "avalanche-restart" event where, for example, a large power outage + affects a large number of endpoints, that, when power is restored, + all attempt to reboot and, possibly, test. Devices need to randomize + their initiation of a boot time test to avoid the problem. + +16. Security Considerations + + Security considerations for emergency calling have been documented in + [RFC5069] and [RFC6280]. + + This document suggests that security (TLS or IPsec) be used hop-by- + hop on a SIP call to protect location information, identity, and + other privacy-sensitive call data. It also suggests that if the + attempt to create a security association fails, the call be retried + without the security. It is more important to get an emergency call + through than to protect the data; indeed, in many jurisdictions + privacy is explicitly waived when making emergency calls. Placing a + call without security may reveal user information, including + location. The alternative, failing the call if security cannot be + established, is considered unacceptable. + +17. Acknowledgments + + This document was created from "Emergency Services for Internet + Telephony Systems" (Schulzrinne, 2004) together with sections from + "Emergency Context Routing of Internet Technologies Architecture + Considerations" (Polk, 2006). + + Design Team members participating in this document creation include + Martin Dolly, Stu Goldman, Ted Hardie, Marc Linsner, Roger Marshall, + Shida Schubert, Tom Taylor, and Hannes Tschofenig. Further comments + and input were provided by Richard Barnes, Barbara Stark, and James + Winterbottom. + + + + + + + +Rosen, et al. Informational [Page 33] + +RFC 6443 Emergency Call Framework December 2011 + + +18. Informative References + + [LLDP] IEEE, "IEEE802.1ab Station and Media Access Control", + December 2004. + + [LLDP-MED] ANSI/TIA, "Link Layer Discovery Protocol - Media + Endpoint Discovery", TIA Standard, TIA-1057, April 2006. + + [NENAi3TRD] NENA, "08-751 v1 - i3 Technical Requirements (Long Term + Definition)", 2006. + + [PHONEBCP] Rosen, B. and J. Polk, "Best Current Practice for + Communications Services in support of Emergency + Calling", Work in Progress, September 2011. + + [RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, + A., Peterson, J., Sparks, R., Handley, M., and E. + Schooler, "SIP: Session Initiation Protocol", RFC 3261, + June 2002. + + [RFC3264] Rosenberg, J. and H. Schulzrinne, "An Offer/Answer Model + with Session Description Protocol (SDP)", RFC 3264, + June 2002. + + [RFC3325] Jennings, C., Peterson, J., and M. Watson, "Private + Extensions to the Session Initiation Protocol (SIP) for + Asserted Identity within Trusted Networks", RFC 3325, + November 2002. + + [RFC3428] Campbell, B., Rosenberg, J., Schulzrinne, H., Huitema, + C., and D. Gurle, "Session Initiation Protocol (SIP) + Extension for Instant Messaging", RFC 3428, + December 2002. + + [RFC3515] Sparks, R., "The Session Initiation Protocol (SIP) Refer + Method", RFC 3515, April 2003. + + [RFC3550] Schulzrinne, H., Casner, S., Frederick, R., and V. + Jacobson, "RTP: A Transport Protocol for Real-Time + Applications", STD 64, RFC 3550, July 2003. + + [RFC3551] Schulzrinne, H. and S. Casner, "RTP Profile for Audio + and Video Conferences with Minimal Control", STD 65, + RFC 3551, July 2003. + + [RFC3693] Cuellar, J., Morris, J., Mulligan, D., Peterson, J., and + J. Polk, "Geopriv Requirements", RFC 3693, + February 2004. + + + +Rosen, et al. Informational [Page 34] + +RFC 6443 Emergency Call Framework December 2011 + + + [RFC3711] Baugher, M., McGrew, D., Naslund, M., Carrara, E., and + K. Norrman, "The Secure Real-time Transport Protocol + (SRTP)", RFC 3711, March 2004. + + [RFC3841] Rosenberg, J., Schulzrinne, H., and P. Kyzivat, "Caller + Preferences for the Session Initiation Protocol (SIP)", + RFC 3841, August 2004. + + [RFC3856] Rosenberg, J., "A Presence Event Package for the Session + Initiation Protocol (SIP)", RFC 3856, August 2004. + + [RFC3986] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform + Resource Identifier (URI): Generic Syntax", STD 66, + RFC 3986, January 2005. + + [RFC4103] Hellstrom, G. and P. Jones, "RTP Payload for Text + Conversation", RFC 4103, June 2005. + + [RFC4119] Peterson, J., "A Presence-based GEOPRIV Location Object + Format", RFC 4119, December 2005. + + [RFC4190] Carlberg, K., Brown, I., and C. Beard, "Framework for + Supporting Emergency Telecommunications Service (ETS) in + IP Telephony", RFC 4190, November 2005. + + [RFC4301] Kent, S. and K. Seo, "Security Architecture for the + Internet Protocol", RFC 4301, December 2005. + + [RFC4474] Peterson, J. and C. Jennings, "Enhancements for + Authenticated Identity Management in the Session + Initiation Protocol (SIP)", RFC 4474, August 2006. + + [RFC4504] Sinnreich, H., Lass, S., and C. Stredicke, "SIP + Telephony Device Requirements and Configuration", + RFC 4504, May 2006. + + [RFC4776] Schulzrinne, H., "Dynamic Host Configuration Protocol + (DHCPv4 and DHCPv6) Option for Civic Addresses + Configuration Information", RFC 4776, November 2006. + + [RFC4967] Rosen, B., "Dial String Parameter for the Session + Initiation Protocol Uniform Resource Identifier", + RFC 4967, July 2007. + + [RFC4975] Campbell, B., Mahy, R., and C. Jennings, "The Message + Session Relay Protocol (MSRP)", RFC 4975, + September 2007. + + + + +Rosen, et al. Informational [Page 35] + +RFC 6443 Emergency Call Framework December 2011 + + + [RFC5012] Schulzrinne, H. and R. Marshall, "Requirements for + Emergency Context Resolution with Internet + Technologies", RFC 5012, January 2008. + + [RFC5031] Schulzrinne, H., "A Uniform Resource Name (URN) for + Emergency and Other Well-Known Services", RFC 5031, + January 2008. + + [RFC5069] Taylor, T., Tschofenig, H., Schulzrinne, H., and M. + Shanmugam, "Security Threats and Requirements for + Emergency Call Marking and Mapping", RFC 5069, + January 2008. + + [RFC5077] Salowey, J., Zhou, H., Eronen, P., and H. Tschofenig, + "Transport Layer Security (TLS) Session Resumption + without Server-Side State", RFC 5077, January 2008. + + [RFC5139] Thomson, M. and J. Winterbottom, "Revised Civic Location + Format for Presence Information Data Format Location + Object (PIDF-LO)", RFC 5139, February 2008. + + [RFC5222] Hardie, T., Newton, A., Schulzrinne, H., and H. + Tschofenig, "LoST: A Location-to-Service Translation + Protocol", RFC 5222, August 2008. + + [RFC5223] Schulzrinne, H., Polk, J., and H. Tschofenig, + "Discovering Location-to-Service Translation (LoST) + Servers Using the Dynamic Host Configuration Protocol + (DHCP)", RFC 5223, August 2008. + + [RFC5359] Johnston, A., Sparks, R., Cunningham, C., Donovan, S., + and K. Summers, "Session Initiation Protocol Service + Examples", BCP 144, RFC 5359, October 2008. + + [RFC5491] Winterbottom, J., Thomson, M., and H. Tschofenig, + "GEOPRIV Presence Information Data Format Location + Object (PIDF-LO) Usage Clarification, Considerations, + and Recommendations", RFC 5491, March 2009. + + [RFC5626] Jennings, C., Mahy, R., and F. Audet, "Managing Client- + Initiated Connections in the Session Initiation Protocol + (SIP)", RFC 5626, October 2009. + + [RFC5627] Rosenberg, J., "Obtaining and Using Globally Routable + User Agent URIs (GRUUs) in the Session Initiation + Protocol (SIP)", RFC 5627, October 2009. + + + + + +Rosen, et al. Informational [Page 36] + +RFC 6443 Emergency Call Framework December 2011 + + + [RFC5630] Audet, F., "The Use of the SIPS URI Scheme in the + Session Initiation Protocol (SIP)", RFC 5630, + October 2009. + + [RFC5764] McGrew, D. and E. Rescorla, "Datagram Transport Layer + Security (DTLS) Extension to Establish Keys for the + Secure Real-time Transport Protocol (SRTP)", RFC 5764, + May 2010. + + [RFC5985] Barnes, M., "HTTP-Enabled Location Delivery (HELD)", + RFC 5985, September 2010. + + [RFC5986] Thomson, M. and J. Winterbottom, "Discovering the Local + Location Information Server (LIS)", RFC 5986, + September 2010. + + [RFC6225] Polk, J., Linsner, M., Thomson, M., and B. Aboba, + "Dynamic Host Configuration Protocol Options for + Coordinate-Based Location Configuration Information", + RFC 6225, July 2011. + + [RFC6280] Barnes, R., Lepinski, M., Cooper, A., Morris, J., + Tschofenig, H., and H. Schulzrinne, "An Architecture for + Location and Location Privacy in Internet Applications", + BCP 160, RFC 6280, July 2011. + + [RFC6442] Polk, J., Rosen, B., and J. Peterson, "Location + Conveyance for the Session Initiation Protocol", + RFC 6442, December 2011. + + [WGS84] NIMA, "NGA: DoD World Geodetic System 1984, Its + Definition and Relationships with Local Geodetic + Systems", Technical Report TR8350.2, Third Edition, + July 1997. + + + + + + + + + + + + + + + + + +Rosen, et al. Informational [Page 37] + +RFC 6443 Emergency Call Framework December 2011 + + +Authors' Addresses + + Brian Rosen + NeuStar, Inc. + 470 Conrad Dr + Mars, PA 16046 + USA + + EMail: br@brianrosen.net + + + Henning Schulzrinne + Columbia University + Department of Computer Science + 450 Computer Science Building + New York, NY 10027 + USA + + Phone: +1 212 939 7042 + EMail: hgs@cs.columbia.edu + URI: http://www.cs.columbia.edu + + + James Polk + Cisco Systems + 3913 Treemont Circle + Colleyville, Texas 76034 + USA + + Phone: +1-817-271-3552 + EMail: jmpolk@cisco.com + + + Andrew Newton + TranTech/MediaSolv + 4900 Seminary Road + Alexandria, VA 22311 + USA + + Phone: +1 703 845 0656 + EMail: andy@hxr.us + + + + + + + + + + +Rosen, et al. Informational [Page 38] + |