Top Banner
Document Type: Technical Report TITLE: Location Acquisition and Location Parameter Conveyance for Internet Access Networks in Support of Emergency Services DOCUMENT NUMBER: ATIS- XXXXXX. SOURCE: Emergency Services Interconnection Forum CONTACT: Anand Akundi, Telcordia Technologies, (732) 699-6031; Christian Militeau, Intrado Inc., (720) 494-5245 1.1 Abstract This ATIS Technical Report is not intended to be seen as an American National Standard. Rather it is intended to be used as input to further decision-making processes leading to any necessary policy and/or American National Standards formulation. It will be used as a vehicle for communicating concepts in liaisons with other relevant SDOs. This document describes the specific areas of location acquisition and location parameter conveyance in Internet Protocol (IP) access networks. It concerns itself with both the architectures and protocols for supporting these functions. In brief, this is about the manner in which IP devices such as Voice over Internet Protocol (VoIP) clients obtain location information from an access network – location acquisition. It also describes an example method by which a entity acting as a Location Information Server (LIS) could obtain the value of parameters from access networks pertinent to the requesting IP device, should it require this data to provide the device’s location. For emergency services to work as envisioned by the National Emergency Number Association (NENA)-defined i2 architecture for VoIP, location must be available to route the call to a PSAP and to provide the call taker with the caller's location. This information is required in the i2 architecture and will continue to be required in i3. This document starts by describing the mechanisms by which a client might obtain location or by which a 1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 2
36
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Notice

Document Type: Technical ReportTITLE: Location Acquisition and Location Parameter Conveyance for Internet Access Networks in Support of Emergency ServicesDOCUMENT NUMBER: ATIS-XXXXXX.SOURCE: Emergency Services Interconnection ForumCONTACT: Anand Akundi, Telcordia Technologies, (732) 699-6031; Christian Militeau, Intrado Inc., (720) 494-5245

1.1 Abstract

This ATIS Technical Report is not intended to be seen as an American National Standard. Rather it is intended to be used as input to further decision-making processes leading to any necessary policy and/or American National Standards formulation. It will be used as a vehicle for communicating concepts in liaisons with other relevant SDOs.

This document describes the specific areas of location acquisition and location parameter conveyance in Internet Protocol (IP) access networks. It concerns itself with both the architectures and protocols for supporting these functions. In brief, this is about the manner in which IP devices such as Voice over Internet Protocol (VoIP) clients obtain location information from an access network – location acquisition. It also describes an example method by which a entity acting as a Location Information Server (LIS) could obtain the value of parameters from access networks pertinent to the requesting IP device, should it require this data to provide the device’s location.

For emergency services to work as envisioned by the National Emergency Number Association (NENA)-defined i2 architecture for VoIP, location must be available to route the call to a PSAP and to provide the call taker with the caller's location. This information is required in the i2 architecture and will continue to be required in i3. This document starts by describing the mechanisms by which a client might obtain location or by which a network might provide location to or on behalf of a client. There are a number of protocols which might be used, including DHCP, LLDP-MED, SIP presence, HELD, MLP, and LCP. This document provides a targeted analysis of each, but it does not presume that any single protocol will be used universally. In deployments where DHCP is already ubiquitous, for example, it will likely not be replaced. Similarly, the mobile environments described in 3GPP [32] and 3GPP2 [33] already have specified solutions which meet or could be extended to meet these functional requirements; duplication of those functions may be unnecesary.

1

12

3456789

10

11

12131415

1617181920212223

24252627282930313233343536

2

Page 2: Notice

ATIS-XXXXXXX

1.2 Notice

This is a draft document and thus, is dynamic in nature. It does not reflect a consensus of ESIF members and it may be changed or modified. Neither ATIS nor ESIF makes any representation or warranty, express of implied, with respect to the sufficiency, accuracy or utility of the information or opinion contained or reflected in the material utilized. ATIS and ESIF further expressly advise that any use of or reliance upon the material in question is at your risk and neither ATIS nor ESIF shall be liable for any damage or injury, of whatever nature, incurred by any person arising out of any utilization of the material. It is possible that this material will at some future date be included in a copyrighted work by ATIS.

2

1

1

23456789

10

2

Page 3: Notice

ATIS-XXXXXXX

Document ATIS-XXXXXX.Prepared by

Emergency Services Interconnection ForumWorking Group

Next Generation Emergency Services Subcommittee (NGES) Issue 50

1.3 Foreword

The rapid rise of Voice over IP telephony services was anticipated by the National Emergency Number Association (NENA). In 2003, it established working groups to define a “migratory” architecture (i2) and an “end game” architecture (i3) to provide the ability to reliably deliver and process emergency calls originated by Internet-based VoIP telephony users. Both the i2 and i3 architectures depend on the ability to determine and communicate the location of the caller so that a) the call can be routed to the correct PSAP and b) the location can be delivered to the PSAP operator for dispatch and other procedural purposes. A functional entity called the Location Information Server (LIS) is introduced in the NENA i2 documents. These documents [1] [18] define requirements and the form of location information provided, however they do not provide the detailed protocol specifications associated with LIS functionality.

In practice, the role of the LIS can be split into two key functions:

Location acquisition – the method by which IP devices and applications obtain location information.

Location measurement and determination – the method by which a server providing location information associates the IP device making an emergency call with a location

Many networks have already developed infrastructures suitable for the delivery of location information. Distribution of location using existing infrastructure cuts down operator costs, reduces the time needed for deployment, and improves reliability by ensuring that the basic mechanisms are in consistent use. It would be valuable, however, to provide a network-infrastructure independent mechanism for networks where no infrastructure is currently available. Even where such a network-independent acquisition protocol is in use, however, it must be recognized that the manner in which location is calculated and the form of location will vary significantly depending on the nature of the access technology.

1.4 Revision History

Revision Date Remarks1.0 April 5, 2007 Version 1

3

1

1

23456

7

89

101112131415161718

19

2021

222324

2526272829303132

33

34

2

Page 4: Notice

ATIS-XXXXXXX

Table of Contents

1.1 Abstract........................................................................................................................................... 1

1.2 Notice.............................................................................................................................................. 2

1.3 Foreword......................................................................................................................................... 3

1.4 Revision History.............................................................................................................................. 3

2 Introduction/Executive Summary..........................................................................................................6

3 Abbreviations, Acronyms, and Symbols...............................................................................................8

4 NENA i2 Stage of Evolution................................................................................................................10

4.1 Summary of LIS Functions in the NENA Architecture...................................................................11

4.2 LIS Requirements Prescribed By NENA.......................................................................................11

4.3 The NENA IP Architectures..........................................................................................................13

5 LIS Operational Considerations..........................................................................................................14

5.1 Types of LIS and LIS Operators...................................................................................................14

5.1.1 Access Infrastructure Provider Network...............................................................................15

5.1.2 Internet Service Provider......................................................................................................15

5.1.3 Geo-distributed LAN.............................................................................................................15

5.1.4 Geo-point LAN.....................................................................................................................15

5.1.5 Summary.............................................................................................................................. 16

5.2 Certificate Security and Management...........................................................................................16

5.3 OSS Integration Considerations...................................................................................................16

6 Location Acquisition Protocols............................................................................................................18

6.1 Protocol Descriptions....................................................................................................................18

6.1.1 Dynamic Host Configuration Protocol (DHCP) RFC3825.....................................................18

6.1.2 Link Layer Discovery Protocol for Media Endpoint Devices (LLDP-MED)............................18

6.1.3 HTTP Enabled Location Delivery (HELD)............................................................................18

6.1.4 Retrieving End-System LOcation information (RELO)..........................................................18

6.1.5 A Location Reference Event Package for the Session Initiated Protocol (LREP-SIP)..........19

6.1.6 Location Configuration Protocol (LCP).................................................................................19

6.2 Location Protocol Gap Analysis Against NENA i2 Requirements.................................................19

6.3 Findings........................................................................................................................................ 22

6.4 Protocol Status............................................................................................................................. 22

7 Specific Recommendations................................................................................................................23

7.1 LIS Recommendations..................................................................................................................23

7.2 Location Acquisition Protocol Recommendations.........................................................................23

7.3 Location Parameter Conveyance Protocol Recommendations.....................................................23

8 References......................................................................................................................................... 24

4

1

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

2

Page 5: Notice

ATIS-XXXXXXX

Table of Figures

Figure 4-1 NENA i2 architecture................................................................................................................10

5

1

12

3

4

5

2

Page 6: Notice

ATIS-XXXXXXX

2 Introduction/Executive Summary

The NENA VoIP migratory working group defined the i2 network architecture designed to support emergency service calls originating from VoIP services on the Internet. The architecture requires location to be used to route a call to the appropriate PSAP and to provide location information to PSAP operator terminals. The architecture describes the method by which location is obtained in terms of a function associated with a “Location Information Server” or LIS..

The i2 specification does not detail the method by which the VoIP device or proxy server provides location, nor does it describe how location should be determined.. NENA requested ATIS/ESIF to provide recommendations for the protocol and implementation specifics of the LIS function for the broadband access and emergency services industry. ATIS/ESIF has responded to NENA’s request by publication of this document, which is comprised of multiple parts, those being; 1) Background, 2) Discussion and Analysis, 3) Recommendations.

This document divides the subject into two areas. The first is “Location Acquisition” which describes the manner in which VoIP devices or proxy servers obtain location. Among the likely methods are DHCP, LLDP-MED, SIP presence, LCP, MLP, and HELD. Given that several of these protocols are already deployed by operators to configure those accessing their networks, it is likely that more than one protocol will be deployed, depending on the network architecture of the deployment. The development of a single protocol for use in networks without deployed infrastructure for host configuration is recommended. Candidate protocols for this functionality are compared against the NENA defined requirements.. Candidate location acquisition protocols (DHCP, LLDP-MED, HELD, LREP-SIP and LCP) are compared against the NENA defined requirements. The second area of discussion is “Location Determination”, which is the manner in which a network determines the location of a device. For cases where the existing network architecture does not provide a suitable method of determining and communicating this data, a generic architecture based on the functional mechanisms in the LIS and an access location entity (ALE) is described. A protocol called the Flexible LIS-ALE Protocol (FLAP) is described which supports this architecture.

The results of this analysis are provided as a basis for discussion and decision-making. Input from a range of major SDOs and other interested parties were taken into consideration in development of this document.

The following summarizes the recommendations of this Technical Report. The expanded recommendations and rationale are contained in Section 7.

1. The LIS function should be implemented in networks which do not already provide methods for configuring location in attached hosts, either by extending existing configuration methods or the use of a access-technology independent protocol.

2. Different types of devices may serve as a LIS in different network deployments; they will use protocols developed for those environments in

6

1

1

2

345678

9101112131415

161718192021222324252627282930313233

343536

3738

39404142

4344

2

Page 7: Notice

ATIS-XXXXXXX

most cases, but may use an access-technology independent protocol where there is no available infrastructure.

3. ESIF recommends that the need for standards for Operations Support Systems associated with a LIS be liaised to the appropriate standards committee.

4. For the NENA i2 architecture, ESIF recommends HELD as specified in the IETF as the access technology independent protocol to be used where no other protocol has been specified or deployed.

5. Within the procedural framework of ATIS, ESIF intends to initiate the standards development and formal specification of a location parameter conveyance protocol (FLAP) for use in conjunction with HELD in networks where no existing architecture support location acquisition..

It should be noted that this Technical Report does not evaluate certain alternative solutions – for example, solutions applicable to cases where the VSP has direct or indirect knowledge of the access network (e.g. has a business relationship with the access network or with some proxy to the access network) and for which location acquisition by the VSP could be an effective substitute for some of the solutions considered here.

7

1

12

345

678

9101112

131415161718

19

2

Page 8: Notice

ATIS-XXXXXXX

3 Abbreviations, Acronyms, and Symbols

Term Brief Definition

ALE Access Location Entity

ATM Asynchronous Transfer Mode

BEEP Blocks Extensible Exchange Protocol (RFC3080, RFC3081)

BRAS Broadband Regional Access Server

BSSLAP Base Station System Location Assistance Protocol

CMTS Cable Modem Termination System

DHCP Dynamic Host Configuration Protocol

DSL Digital Subscriber Line

DSLAM DSL Access Module

FLAP Flexible LIS-ALE Protocol

GGSN Gateway GPRS Support Node

GMLC Gateway Mobile Location Center

GPRS General Packet Radio Service

HELD HTTP Enabled Location Delivery

ISP Internet Service Provider

L2TP Layer 2 Tunneling Protocol

LIS Location Information Server

LMU Location Measurement Unit

MAC Media Access Control

NAS Network Access Server

PVC Permanent Virtual Circuit

RADIUS Remote Authentication Dial In User Service

8

1

1

2

Page 9: Notice

ATIS-XXXXXXX

Term Brief Definition

RANP Regional Access Network Provider

RBP Regional Broadband Provider

SGSN Serving GPRS Support Node

SLP SUPL Location Platform

SMLC Serving Mobile Location Center

SNMP Simple Network Management Protocol

SUPL Secure User Plane Location

VESA Valid Emergency Service Authority

VPC VoIP Positioning Center

9

1

1

2

Page 10: Notice

ATIS-XXXXXXX

BACKGROUND

4 NENA i2 Stage of Evolution

The NENA i2 stage of evolution, as described in the NENA 08-001 document [01] was proposed with the intent of addressing the immediate need of providing standard emergency services support to next generation Residential Broadband VoIP phone users. A strong requirement of i2 from the onset was to make little or no change to the existing emergency infrastructure, in particular any solution was to impose no change to PSAPs. The data sets associated with location of an IP device, when investigated further were found to be similar to location parameters associated with wireless cellular networks. The resulting architecture for i2 therefore adopted concepts from wireless Phase 2 .

Figure 4-1 NENA i2 architecture

The NENA i2 architecture (see Figure 4-1) identified 5 new functional elements, 9 new interfaces, and made minor changes to the E2+ to support VoIP class of service indicators between the new VoIP Positioning Center (VPC) and the existing ALI infrastructure. While the detailed functions of each of the new 5 network elements is defined in the i2 specification, not all of the interfaces between nodes are specified. Specifically, the V0 and V1 interfaces were deemed out of scope for i2.

There is a fundamental principle in the i2 architecture that location is required to route calls to the correct PSAP and should also be conveyed to the call taker. Any architecture which

10

1

1

2

3456789

10

11

1213

141516171819

2021

2

Page 11: Notice

ATIS-XXXXXXX

handles emergency calls should meet these requirements, not just for i2, but going forward.

Within the i2 architecture the V2 interface to the VPC is well described and specified. Similarly the function of the ESGW is well understood.. In addition, the VPC and ESGW are migratory solution constructs. They don’t necessarily have a long term role into a future where emergency calling occurs IP end-to-end between VoIP devices and VoIP enabled emergency call centers.

In contrast to the VPC and ESGW functions, the LIS interfaces (V0 and V1) have the least level of detail in the i2 specification. The V1 interface is recognized to be VoIP-protocol specific so the only requirement cited by i2 is the ability of that interface to convey location in the form of a Presence Information Data Format-Locaton Object (PIDF-LO) or as a URI from which a PIDF-LO can be retrieved. The V0 LIS function can be served by existing provisioning mechanisms (e.g. DHCP, LLDP-MED) or by any architecture that meets the functional requirement. Individual networks will likely vary on their choice of mechanism, as networks have already deployed provisioning mechanisms for other purposes. There should, however, be a single preferred (or) defined protocol for use in networks where new infrastructure support has been provided..This document focuses on the LIS functionality and recommends HELD as the preferred protocol for this purpose.

4.1 Summary of LIS Functions in the NENA Architecture

While the i2 architecture did not elaborate on the form of the V0 interface protocol(s) or the manner in which the LIS is expected to determine device location, the i2 working group did provide supporting technical documents describing the requirements for the V0 interface and for the LIS function. One such document is the NENA Technical Requirements Document (TRD) for Location Information to Support IP-Based Emergency Services NENA 08-752, Issue 1, December 21, 2006 [18].

The requirements for the LIS were divided into three areas

Location determination and acquisition (DA)

Location representation (Rep)

Location security and dependability (LocSec)

The following section lists these requirements.

4.2 LIS Requirements Prescribed By NENA

The following requirements come from the NENA Requirements for the location information to support emergency services [18].

DA1– The access network shall provide a mechanism for determination and acquisition of location information, and support queries for location.

DA2 – The location estimate used shall be that associated with the physically (wire, fiber, air) connected network.

DA3 – Location may be requested at any time. Location information must be associated with the device at the time the location is requested.

DA4 – Location acquisition should be provided by a consistent method across all network configurations.

11

1

12

34567

89

101112131415161718

19

202122232425

26

27

28

29

30

31

3233

3435

3637

3839

4041

2

Page 12: Notice

ATIS-XXXXXXX

DA5 – Location determination and acquisition mechanisms should be applicable to emergency calling; they may also be applicable to a wide range of value-added location-based services.

DA6 – Location determination and acquisition techniques shall support both NENA i2 and i3 network architectures.

DA7 – When measurement-based location determination mechanisms fail, the most accurate location information available should be provided. Examples include: For mobile, the Wireless Service Provider might provide tower/Access Point location, last known fix, etc. For wireline, a LIS might provide a civic location that defines the serving area of an access point, e.g., the State of Texas.

DA8 – Location determination and acquisition must have minimal impact on call setup time in the event that location is not known ahead of time.

DA9 – Where a device is not location aware, the network should have the ability to assert a location estimate on behalf of the device.

DA10 – Location acquisition methods should not require modification of hardware/firmware in home-routers/modems.

DA11 – A location determination method must exist that does not require network hardware replacement in the core network.

DA12 – The location acquisition protocol shall allow the requesting device to specify a response time requirement to the LIS when requesting location information. The response time is expressed as the maximum time that the requesting node is prepared to wait for location information. The LIS is required to provide the most accurate location fix it can within the specified response time.

Rep1– Location information may be provided by-value or by-reference; the form is subject to the nature of the request.

Rep2 – Location determination and acquisition mechanisms must support all location information fields defined within a PIDF-LO.

Rep3 – Location acquisition mechanisms must allow for easy backwards compatibility as the representation of location information evolves.

Rep4 – All representations of location shall include the ability to carry altitude and/or floor designation. This requirement does not imply altitude and/or floor designation is always used or supplied.

LocSec1– Location information shall only be provided to authenticated and authorized network devices. The degree of authentication and authorization required may vary depending on the network.

LocSec2 – Location determination and acquisition methods should preserve privacy of location information, subject to local laws and regulations applicable to the endpoint’s geographic location.

LocSec 3 – The location or location estimate of a caller should be dependable.

LocSec4 – The location acquisition protocol must support authentication of the Location Information Server, integrity protection of the Location Information, and protection against replay.

12

1

123

45

6789

10

1112

1314

1516

1718

1920212223

24

2526

2728

2930

313233

343536

373839

40

414243

2

Page 13: Notice

ATIS-XXXXXXX

LocSec5 – The location source shall be identified and should be authenticated. This includes manually entered locations.

LocSec6 – Where a location is acquired and cached prior to an emergency call, it SHOULD be refreshed at regular intervals to ensure that it is as current as possible in the event location information cannot be obtained in real time.

LocSec 7 – Where location by-reference is used, the appropriate privacy policies MUST be implemented and enforced by the LIS operator.

4.3 The NENA IP Architectures

The NENA i2 architecture is a transitional architecture defined in advance of the deployment of NENA i3, which will handle VoIP natively. NENA has already put forward functional requirements for i3 (NENA 08-751), which include specific requirements for the use, conveyance, and validation of location. For both i2 and i3, the NENA architecture must handle cases where the access network and the voice service provider may be different. This, in turn, raises the possibility that the access network may be in one jurisdiction and the voice services provider another. There are significant challenges there, especially in light of the following assumptions set out in Section 3 of the NENA i3 requirements document:

“There is no assumption that a voice or other Communications Service Provider is in the path from the originating end terminal to the PSAP. An enterprise may directly offer calls to the system, and indeed an individual may, if they so choose, route emergency calls to the proper PSAP.

Calls may be placed on the Internet, and the Internet does not respect national boundaries, which means that calls can come from anywhere and be processed by a routing element anywhere else. Furthermore, visitors from other countries roaming into North America must be able to place calls to 9-1-1, and it is expected to be common that equipment purchased outside the U.S. will be used on U.S. originating networks. For these reasons, portions of the conforming i3 implementations (i.e. CPE) must conform to international standards for emergency calls, such as those promulgated by the IETF and others. “

No single system architecture will serve individual, enterprises and carriers equally well, nor will any single set of parameters meet the needs of every jurisdiction. Rather than define that single architecture, NENA has set out functional requirements for the protocols deployed in specific architectures to meet. Those broad functional requirements will be relevant to emergency services in multiple jurisdictions. In particular, the use of location to determine how to route a call to the correct part of the emergency infrastructure will be common, as will the need to carry location to the call taker.

13

1

12

345

67

8

9

101112131415161718

19202122232425262728293031323334

35363738394041

2

Page 14: Notice

ATIS-XXXXXXX

DISCUSSION

5 LIS Operational Considerations

The conceptual role of the LIS is to provide location information to its clients. As noted by the NENA architecture documents, the only business relationship between an access provider and a voice service provider may be that they share a customer. In architectures where this is the only relationship, data shared between the access provider and voice service provider may have to be relayed through the customer. Where there are existing relationships between the access provider and the service provider (be it an Internet service provider or voice service provider), there may be multiple, independent entities involved..

For example, broadband DSL subscribers establish a commercial relationship with an Internet Service Provider (ISP) who, for the price of the subscription, undertakes to provide the DSL service to that subscriber’s residential address. The ISP, however, may not own the DSL infrastructure, the copper wires and DSLAM equipment that provides the physical connectivity for the subscriber. This infrastructure may be owned by a quite independent Regional Broadband Provider (RBP).

In this situation, the ISP pays the RBP for the physical access on behalf of, and quite transparently to, the subscriber.

The RBP operates the physical access infrastructure from which the location can be determined; i.e. the RBP can determine the physical DSLAM termination and residential address associated with the copper pair on that termination. A practical deployment topology, then, is to have the RBP operate the LIS which actually determines the location. The ISP and the RBP business entities already have a commercial relationship and data interconnection as part of the general provision of Internet access that is the purpose of the relationship. And, in this case, the ISP LIS will also utilize the RBP LIS infrastructure to perform the actual location determination.

The above, is just one example, of how a LIS implementation may be driven by organizational and commercial relationships. In the example given, the ISP LIS services the client requests but needs to be able to communicate with the RBP LIS in order to resolve actual location information. The same considerations may apply for technologies in which access is wholesaled by an infrastructure operator to an ISP.

The following sections examine some of the practical factors that affect the implementation and deployment of LIS functionality.

5.1 Types of LIS and LIS Operators

The types of LIS operators (organizational entities that may own and operate a LIS) include, though may not be limited to, the following:

◦ Access infrastructure providers

◦ Internet Service Providers

14

1

1

2

3456789

10

111213141516

1718

1920212223242526

2728293031

3233

34

3536

37

38

2

Tom Breen-BellSouth, 06/19/07,
6-19-2007: Editor asksif this word needs to stay or go away?
Page 15: Notice

ATIS-XXXXXXX

◦ Geo-distributed1 LAN operators

◦ Geo-point2 LAN operators

As described in the introductory text, the form and function of the LIS implementation in each of the above cases will vary. They are taken in turn in the following sections.

5.1.1 Access Infrastructure Provider Network

In this case, we are dealing with the operator of the physical infrastructure (wired or wireless) which is used by subscribers to gain access to the public Internet. The LIS in this environment has the key task of determining location. It may provide location to the devices themselves or it may serve a third-party device, such as an ISP LIS.

5.1.2 Internet Service Provider

Where the ISP owns and operates its own access infrastructure, then the LIS implementation will be as described for an access infrastructure operator LIS. Where the ISP purchases access infrastructure wholesale from another operator, the LIS may not actually perform location determination itself. In this case the ISP LIS obtains the location from the infrastructure operator. The ISP LIS supports one or more protocols for provisioning location to the subscriber devices but it relies on the infrastructure operator to obtain the location corresponding to those devices.

The protocol used from the ISP LIS to the infrastructure operator may be a standard location acquisition protocol.

5.1.3 Geo-distributed LAN

An enterprise LAN is a common example of a Geo-distributed LAN. An LIS used in a Geo-distributed LAN must be able to distinguish among the locations served by the LAN, and it must be able to associate a location with the different parts of its topology. This may be as simple as providing a wire-map database that covers mutliple campuses. It may be more complex in cases where the LAN involves both wired and wireless points of attachment..

A large enterprise may actually be regarded as the equivalent of an access infrastructure provider, in that its LIS may support all of the functions of a general LIS with the exception of supporting other ISPs re-using its infrastructure.

5.1.4 Geo-point LAN

A typical Geo-point LAN might correspond to a residential home LAN where there is no requirement to refine location to any finer degree than can be determined by the access provider. It is not actually necessary to operate a LIS in such an environment.

1 No hard definition of “geo-distributed” or “broad geographic coverage is offered in this text. To an extent, this will be governed by circumstance and jurisdiction. For example, a LAN operating in a large building covering thousands of square feet may be considered a “geo-distributed” network if either the owner/operator of the building or the jurisdiction in which the building is located consider it necessary to resolve discrete locations within that building – as opposed to just a centroid geodetic location or overall civic address for the building. The local jurisdictions may require such large buildings to provide a more precise location than just the civic address in the case of emergency calls. If neither imperative exists, then the LAN, despite its actual size, may be regarded as a geo-point network.2 As with “geo-distributed”, no hard definition of “geo-point” is provided in this text. Again, the question of whether a hotspot offered by a coffee shop, for example, is considered a geo-point network versus a geo-distributed one depends on circumstances including the question of how big the hotspot coverage actually is.

15

1

1

2

34

5

6789

10

11121314151617

1819

20

212223242526

272829

30

313233

23456789

1011

12

Page 16: Notice

ATIS-XXXXXXX

5.1.5 Summary

The form and function that a specific instance of a LIS has will vary depending on the nature of the network it is supporting and the role that the operator of that network plays in the larger picture of Internet access. The specifics of form and function will inevitably be influenced by these aspects and the business and other relationships that exist between network types.

5.2 Certificate Security and Management

The NENA i2 architecture identifies an agency labeled the Valid Emergency Services Authority (VESA) which will control the generation, issuing, and maintenance of certificates to delegate credential authorities (it may also serve as a delegate credential authority). DCAs are responsible for issuing certificates to the operators of network entities that utilize VESA certificates for the exchange of authenticated data on the i2 defined interfaces. Examples of delegate credential authorities may be PSAP operators, state emergency authorities, or regional 9-1-1 service providers.

It will be critical to the security of the emergency services infrastructure of each jurisdiction implementing the i2 architecture to ensure that the certificates issued by the certificate authority are managed with due care by both the authority and the recipient organizations.

Some LIS operators may require certification by a DCA and should, in that case take care that access to the certificates is appropriately limited [26].

The use of certificates only guarantees that the location data contained is authentic and originated by the signer. Certificates do not protect against replay attacks, e.g. a miscreant steals a signed location object and attaches it to any emergency call or multiple calls. This attack could result in a PSAP being fooled into responding to what is thought a real emergency as the location data passed the certification test. Emergency calls that contain no location certification and/or a failed location certification also would need careful handling so as to not deny services to a legitimate caller.

5.3 OSS Integration Considerations

Section 4 describes the manner in which the location of devices may be determined in access networks based on a range of technologies. A common requirement in all of these solutions is for the LIS to maintain data records which can be used to associate dynamic network parameter values to information which ultimately indicates the location of the user. Examples, of such records are ATM permanent virtual circuit IDs and the corresponding DSLAM termination and residential address associated with them, or the MAC address of a cable modem and the residential address associated with it.

In practice, there will be considerable effort and infrastructure associated with the collection, grooming, provisioning and ongoing synchronization of such records into an operator LIS. Typically, the necessary data may be stored in a range of back end Operational Support Systems (OSS) ranging from network configuration platforms to subscriber record databases.

Since OSS implementations are often operator specific with little standardization in terms of data schema or provisioning interfaces, it may be that the data provisioning functions of a LIS will need to be dealt with by each individual operator. The situation could be mitigated to some extent with the specification of a standard provisioning protocol for LIS functions. While this does not address the thorny aspect of grooming data from its

16

1

1

23456

7

89

1011121314

151617

1819

20212223242526

27

28293031323334

3536373839

4041424344

2

Page 17: Notice

ATIS-XXXXXXX

manifold sources, it would at least allow for a common implementation at the LIS end of the data chain. This document does not describe a common provisioning protocol but it is identified as a potential candidate for further study in an appropriate SDO.

17

1

123

2

Page 18: Notice

ATIS-XXXXXXX

ANALYSIS

6 Location Acquisition Protocols

The term “location acquisition” refers to the process by which a network provides location information to a client. There are a number of approaches and philosophies related to this acquisition process and the protocols that support it. This section looks at various candidates: DHCP, LLDP-MED, HELD, RELO, LREP-SIP and LCP. Each of these may be used in specific deployments, in order to fit in with the operator's existing architecture and services.

6.1 Protocol Descriptions

6.1.1 Dynamic Host Configuration Protocol (DHCP) RFC3825

DHCP delivers network configuration information to an IP device. The intent is to provide the device all the information it needs to utilize the IP network it has connected to; information such as the IP address allocated to the device, the address of the gateway through which the traffic destined beyond the LAN should be sent, and/or the identity of the Domain Name Service (DNS) that can be requested to translate the names of network hosts into their physical IP addresses in order to talk to them. RFC3825 describes an option on DHCP that allows the device to request and receive a specific form of location information (geodetic or civic).

6.1.2 Link Layer Discovery Protocol for Media Endpoint Devices (LLDP-MED)

TIA has defined extensions to the Link Layer Discovery Protocol (LLDP) to support additional information elements applicable to Media Endpoint Devices (MED). These were termed LLDP-MED and included the ability for those end point devices to be informed of the location associated with, for example, the wiremap wall jack location to which they are currently attached. The recommended usage for LLDP-MED is to provide the client location (e.g. wiremap wall jack location), not the 802.3 switch port location since this can vary significantly due to cable or fiber lengths. LLDP-MED supports three location types; the location of the DHCP server, the location of the identifiable network element believed to be closest to the client, or the location of the client.

6.1.3 HTTP Enabled Location Delivery (HELD)

HELD is a newly proposed protocol, specifically for the purpose of supporting location acquisition. It uses HTTP or BEEP as transports and functions at layer 7, so the client device and server do not need to be within the same subnet or broadcast domain to communicate.. HELD is currently a Working Group item in the IETF GEOPRIV WG [04].

6.1.4 Retrieving End-System LOcation information (RELO)

RELO is another newly proposed protocol and also one aimed at supporting location acquisition interaction above Layer 3. RELO is currently an Internet draft submitted to the IETF [28].

18

1

1

2

345678

9

10

1112131415161718

19

202122232425262728

29

30313233

34

353637

2

Page 19: Notice

ATIS-XXXXXXX

6.1.5 A Location Reference Event Package for the Session Initiated Protocol (LREP-SIP)

LREP-SIP is a mechanism for using SIP's presence architecture for the retrieval of location. It relies on the existing relationship between PIDF and PIDF-LO, as well as the likelihood of SIP being used in devices making VoIP calls. It defines a new SIP event package, locationref [30]. It is currently an Internet draft in the IETF GEOPRIV WG [29].

6.1.6 Location Configuration Protocol (LCP)

LCP was defined to provide the same functionality as [08] but replacing DHCP with a new IP-based protocol to carry the location request and response. The form of location provided by LCP is defined to be the same as [08]. It is currently an Internet draft submitted to the IETF GEOPRIV WG [31].

6.2 Location Protocol Gap Analysis Against NENA i2 Requirements

The following table illustrates the evaluation of various location protocols against NENA i2 location Requirements [18] .

NENA Requirement

DHCP LLDP-MED HELD RELO LREP-SIP LCP

DA-1 – Mechanism for determining and acquiring location

Yes – the manner in which location is determined is not defined by DHCP

Yes – location associated with the network port is configured directly on the host most commonly using SNMP

Yes - HELD provides acquisition (FLAP provides measurements for determination)

Yes – the manner in which location is determined is not defined by RELO

Yes – the manner in which location is determined is not defined but the protocol supports the provision of network parameters by the device – currently only supports switch chassis/port.

Yes – the manner in which location is determined is not defined by LCP

DA-2 – Use location estimate

Yes Yes Yes Yes Yes Yes

DA-3 – Location requested any time

Yes Yes Yes Yes Yes Yes

19

1

1

2345

6

789

10

11

1213

2

Page 20: Notice

ATIS-XXXXXXX

NENA Requirement

DHCP LLDP-MED HELD RELO LREP-SIP LCP

DA-4 – Consistent method across all network configurations

Yes

DHCP can be delivered in IP-base network, but it is not preferred where new infrastructure would need to be deployedNo

Since DHCP is not applicable in all network technologies therefore this acquisition mechanism cannot apply to all access networks.

No

Since LLDP-MED is not applicable in all network technologies therefore this acquisition mechanism cannot apply to all access networks.

Yes Yes Yes

The network identifier types are important to location determination. Currently only supports switch chassis/port.

Yes

DA-5 – Applicable to emergency services

Yes

Does not convey uncertainty.

Yes

Does not convey uncertainty.

Yes Yes Yes Yes

Does not convey uncertainty.

DA-6 – Support i2 and i3

Yes Yes Yes Yes Yes Yes

DA-7 – Provide fallback or last known

Non Applicable Non Applicable Non Applicable Non Applicable Non Applicable Non Applicable

DA-8 – Minimal call processing impact

Yes Yes Yes Yes Yes Yes

DA-9 – Assert on behalf of

No No Yes (using third party terminal address value – On Behalf Of type request)

No No No

DA-10 – No Hardware modification

NoYes No Yes Yes Yes Yes

DA-11 – No Hardware replacement

Non Applicable Non Applicable Non Applicable Non Applicable Non Applicable Non Applicable

DA-12 – Request response time

Non Applicable No Yes No No Non Applicable

20

1

2

Tom Breen-BellSouth, 06/19/07,
6-19-2007: STOPPED HERE – to allow all stakeholders to review this specific DHCP related change and other associated proposed changes in this table. An off-line call may be utilized to address this table.
Page 21: Notice

ATIS-XXXXXXX

NENA Requirement

DHCP LLDP-MED HELD RELO LREP-SIP LCP

Rep-1 – Request by reference and by value

Partial, DHCP does not support by-reference

Yes, via an ELIN Yes Yes Yes Partial, LCP does not support location-by-reference

Rep-2 – Support all fields of PIDF-LO

No

Method, presentity, rules, provided-by are not supported.

No

Method, presentity, rules, provided-by are not supported.

Yes Yes Yes No

Method, presentity, rules, provided-by are not supported.

Rep-3 – Backwards compatibility

NoYes

Can only support change through BIS of option or a new option

NoYes

Can only support change through BIS of option or a new option

Yes (PIDF-LO definition evolves independently of HELD acquisition protocol)

Yes by indirection to GML and civilLoc forms

Yes (PIDF-LO definition evolves independently of LREP-SIP acquisition protocol)

NoYes

Can only support change through BIS of [08]

Rep-4 – Provide altitude and floor

Yes Yes Yes Yes Yes Yes

LocSec-1 – Provide only to authorized and authenticated devices

Yes

Can only provide location to the end-point

Yes

Can only provide location to the end-point

Yes No

RELO is not designed to support authentication or authorization

No

Protocol forbids the use of authentication for location dereferencing

Yes

Can only provide location to the end-point

LocSec-2 – Preserve privacy

Yes (except in transmission since location can only be transferred by-value and not by-reference)

Yes Yes No

the device cannot inform the LIS of its privacy preferences

No

Protocol does not support the provision of access rules

Yes (except in transmission since location can only be transferred by-value and not by-reference)

LocSec-3 – Location Dependable

No

No dependability mechanism exists for a PIDF-LO crafted by the end-pointN/A

No

No dependability mechanism exists for a PIDF-LO crafted by the end-pointN/A

Yes (through signed location request mechanism with PIDF-LO delivered fully-constituted by the LIS)N/A

No

RELO has no mechanism to request a signed or dependable PIDF-LO

No

There is no support for signed location or for provision of credentials on dereferencingN/A

No

No dependability mechanism exists for a PIDF-LO crafted by the end-pointN/A

LocSec-4 - Authentication of LIS

Partial

DHCP can provide integrity through [19], but not secrecy

No Yes (through encryption of appropriate attributes in creation of location signatures)

No No No

21

1

2

Page 22: Notice

ATIS-XXXXXXX

NENA Requirement

DHCP LLDP-MED HELD RELO LREP-SIP LCP

LocSec-5 – Source authenticated

No No Yes (credentials associated with signed location indicate the source of the location. A user provided location may be “asserted” and subsequently signed by the LIS)

No No No

LocSec-6 – Refresh cached location

Yes Yes Yes Yes Yes Yes

LocSec-7 – Privacy policies for location by reference

Not applicable

DHCP does not currently support location by-reference – a new proposal to add it has been discussed in the IETF

Not applicable

LLDP-MED does not support location by-reference

Yes Not applicable

RELO does not support location by-reference

No Not applicable

LCP does not support location by-reference

6.3 Findings

Of the 23 NENA provided applicable requirements [18] on location acquisition and determination:

DHCP provides full support for 10 and partial support for 2, but cannot support the remaining 8. Three requirements are not applicable.

LLDP-MED provides full support for 10 and partial support for 1, but cannot support the remaining 9. Three requirements are not applicable.

HELD provides full support for 21, two requirements are not applicable.

RELO provides full support for 12 and partial support for 1. It does not support 7 and 3 are not applicable.

LREP-SIP provides support for 13 but does not support 8. Two requirements are not applicable At time of writing, it was not clear whether the user agent identifier exchange is fundamental to location determination or not. The compliance figures assume it is not, or else there would be lower compliance.

LCP provides support for 12 and partial support for 1. It does not support 7 requirements and 3 are not applicable.

22

1

1

2

34

56

78

9

1011

12131415

1617

2

kirkb, 05/16/07,
The numbers below need to be updated to agree with the changes in the table above.
Page 23: Notice

ATIS-XXXXXXX

In addition, to support mobile devices requiring a mid-call location update, a location reference is the only practical solution and this mechanism is not supported by DHCP, LLDP-MED, RELO, or LCP.

6.4 Protocol Status

The following provides the current status of each protocol at the time this document was puiblished, although the status of those in Draft status are subject to change.

DHCP is defined in IETF RFCs 3825, 4388, 3118, 4388 and 3046

LLDP-MED is released TIA specification 1057

HELD is IETF [correct as needed] Internet Draft

RELO is IETF Internet Draft

LREP-SIP is IETF Internet Draft

LCP is IETF Internet Draft

23

1

123

4

56

7

8

9

10

11

12

2

Page 24: Notice

ATIS-XXXXXXX

RECOMMENDATIONS

7 Specific Recommendations

This section provides a synopsis of ESIF’s recommendations regarding LISs, location acquisition protocols and location parameter conveyance protocols

7.1 LIS Recommendations

Since the LIS is a functional element defined in the NENA i2 architecture, ESIF’s recommendations reinforce the use of LISs and extend the concepts as follows:

1. Any network architecture expecting to support emergency services with VoIP should expect to be able to distribute location. The functional entity doing such distribution, the Location Information Server, may be a part of the configuration infrastructure already present in a network. Where the existing configuration infrastructure has a defined location distribution solution, ESIF encourages operators to deploy the location-specific extensions as soon as they are available. Where the existing configuration infrastructure does not have a defined location distribution solution, ESIF encourages operators to use location acquisitions protocol per the analysis of this Technical Report.The LIS should be the primary network element from which the location of the user is acquired. ESIF recognizes that legacy networks may have already implemented a location acquisition function (e.g. a GMLC) and encourages the operators of those networks to include as part of the capabilities of these pre-existing functions any of the location acquisition protocols recommended in this Technical Report.

2. For infrastructures in which location determination will be performed by a different entity than location distribution, methods must be developed and deployed to associate the acquired location and the entityDifferent categories of LISs may be implemented based upon required interactions between network providers because a carrier or Enterprise network can have target-device specific information. This requires LIS to LIS communications based upon business agreements between the parties (carriers and/or Enterprises).

3. Recognizing that Operation Support Systems (OSSs) are often carrier specific, ESIF recommends that the need for standards associated with a LIS be liaised to the appropriate standards committee. This may be a joint activity between that committee and ESIF.

7.2 Location Acquisition Protocol Recommendations

The table in Section 7.2 compares the attributes of various existing and proposed protocols as they meet the NENA requirements. While ESIF recognizes that each protocol will be presentmay have application in specific deployments, in order to minimize the deployment of redundant protocol infrastructureinstances, HELD addresses the broadest

24

1

1

2

3

4

56

7

89

101112131415161718192021222324252627282930313233

34

35363738

2

Page 25: Notice

ATIS-XXXXXXX

range of NENA requirements across network implementations . ESIF recommends HELD as the location acquisition protocol for networks which do not have existing infrastructure in this domaingoing forward, and specifically for the NENA i2 V0 interface and similar interfaces going forward. In addition, ESIF recommends HELD as the protocol for LIS to LIS communication.

7.3 Location Parameter Conveyance Protocol Recommendations

The analysis in this document has highlighted the need for a location parameter conveyance protocol. Feedback received from other SDOs indicated no current overlap for development of a location parameter conveyance protocol. ESIF plans to initiate the standards development and formal specification of such a location parameter conveyance protocol within the procedural framework of ATIS.

8 References

[01] NENA VoIP-Packet Technical Committee, “Interim VoIP Architecture for Enhanced 9-1-1 Services (i2),” NENA 08-001, Dec 2005.

[02] NENA Technical Committee Chairs, “Implementation of the Wireless Emergency Service Protocol E2 Interface,” NENA 05-001, Dec 2003.

[03] TIA-1057 TIA, “Link Layer Discovery Protocol for Media Endpoint Devices (LLDP-MED),” TR 41.4

[04] Winterbottom, J., Thomson, M., and B. Stark, “HTTP Enabled Location Delivery (HELD),” draft-winterbottom-http-location-delivery-05 (work in progress), March 2007.

[05] Polk, J. and B. Rosen, “Session Initiation Protocol Location Conveyance,” draft-ietf-sip-location-conveyance-05 (work in progress), October 2006.

[06] Droms, R. , “Dynamic Host Configuration Protocol,” RFC 2131, March 1997 (TXT, HTML, XML).

[07] Patrick, M., “DHCP Relay Agent Information Option,” RFC 3046, January 2001.

[08] Polk, J., Schnizlein, J., and M. Linsner, “Dynamic Host Configuration Protocol Option for Coordinate-based Location Configuration Information,” RFC 3825, July 2004.

[09] Peterson, J., “A Presence-based GEOPRIV Location Object Format,” RFC 4119, December 2005.

[10] Thomson, M. and J. Winterbottom, “Revised Civic Location Format for PIDF-LO,” (work in progress), April 2006.

[11] Thomson, M., “Geodetic Shapes for the Representation of Uncertainty in PIDF-LO,” (work in progress), May 2006.

[12] Schulzrinne, H., “Dynamic Host Configuration Protocol (DHCPv4 and DHCPv6) Option for Civic Addresses Configuration Information,” (work in progress), January 2006.

[13] Winterbottom, J., Tschofenig, H., and M. Thomson, “GEOPRIV PIDF-LO Usage Clarification, Considerations and Recommendations,” (work in progress), May 2006.

25

1

12345

6

789

1011

12

1314

1516

1718

192021

2223

2425

26

2728

2930

3132

3334

353637

3839

2

Page 26: Notice

ATIS-XXXXXXX

[14] Winterbottom, J., Peterson, J., and M. Thomson, “Rationale for Location by Reference,” (work in progress), January 2006.

[15] DSL Forum, “Core Network Architecture Recommendations for Access to Legacy Data Networks over ADSL,” Technical Report 025.

[16] DSL Forum, “Migration to Ethernet-Based DSL Aggregation,” Technical Report 101.

[17] Cuellar, J., Morris, J., Mulligan, D., Peterson, J., and J. Polk, “Geopriv Requirements,” RFC 3693, February 2004.

[18] NENA Technical Requirements Document (TRD) for Location Information to Support IP Based Emergency Services, NENA 08-752 Issue 1,December 21, 2006.

[19] Droms, R. and W. Arbaugh, “Authentication for DHCP Messages,” RFC 3118, June 2001.

[20] NENA Recommended Method(s) for Location Determination to Support IP-Based Emergency Services - Technical Information Document NENA 08-505, Issue 1, December 21, 2006

[21] Woundy, R. and K. Kinnear, “Dynamic Host Configuration Protocol (DHCP) Leasequery,” RFC 4388, February 2006.

[22] "IP Location; Geographic Location Measurement, Delivery and Conveyance", Dawson, Winterbottom , Thomson; Osbourne-McGraw-Hill; ISBN: 007226376

[23] Wimer, W. , “Clarifications and Extensions for the Bootstrap Protocol,” RFC 1542, October 1993.

[24] Patrick, M., “DHCP Relay Agent Information Option,” RFC 3046, January 2001.

[25] Decker, E. , Langille, P., Rijsinghani, A., and K. McCloghrie, “Definitions of Managed Objects for Bridges,” RFC 1493, July 1993.

[26] National Institute of Standards and Technology (NIST) – Federal Information Processing standard 140 version 140-2, May 2001.

[27] Dawson, Winterbottom, Thomson, “IP Location”, McGraw-Hill Publishing, 2006

[28] Schulzrinne, H., “RELO: Retrieving End System Location Information”, draft-schulzrinne-geopriv-relo-02.txt, December 17, 2006

[29] Schulzrinne, H., “A Location Reference Event Package for the Session Initiated Protocol (SIP),” draft-schulzrinne-geopriv-locationref-00.txt, October 17, 2006

[30] Rosenberg, J., “A Presence Event Package for the Session Initiation Protocol (SIP),” RFC 3856, August 2004.

[31] Linsner, M. Schnizlein, J., “Location Configuration Protocol (LCP),” draft-linsner-geopriv-lcp-01, November 7, 2006

[32] 3GPP TS 23.167 IP Multimedia Subsystem (IMS) emergency sessions (Release 7) V7.3.0 (2006-12)

[33] 3GPP2 IMS Emergency Call: Stage 2 Specification: X.S0049

26

1

12

34

5

67

89

1011

121314

1516

1718

1920

21

2223

2425

26

2728

2930

3132

3334

3536

37

38

2