ECRIT Architectural Considerations

Slides:



Advertisements
Similar presentations
Internet Standards- Emergency Services Hannes Tschofenig Mail comments to and/or
Advertisements

Additional Data related to an Emergency Call draft-ietf-ecrit-additional-data-00.txt Hannes Tschofenig Brian Rosen.
Washinton D.C., November 2004 IETF 61 st – mip6 WG Goals for AAA-HA interface (draft-giaretta-mip6-aaa-ha-goals-00) Gerardo Giaretta Ivano Guardini Elena.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Session-Independent Policies draft-ietf-sipping-session-indep-policy-01 Volker Hilt Gonzalo Camarillo
Origins of ECRIT IETF has been working on location since 2000 –Spatial BoF, eventually GEOPRIV chartered in 2001 GEOPRIV provides location information.
Emergency Services IAB Tech Chat 28 th February 2007 Hannes Tschofenig.
IETF 61 (November 2004) ECRIT1 Requirements and Architecture for Emergency Calling draft-schulzrinne-sipping-emergency-arch draft-schulzrinne-sipping-emergency-req.
CSCI 4550/8556 Computer Networks Comer, Chapter 19: Binding Protocol Addresses (ARP)
1 Secure Zero Configuration in a Ubiquitous Computing Environment Shenglan Hu and Chris J. Mitchell Information Security Group Royal Holloway, University.
Service Mobility Project Status Report Henning Schulzrinne Ron Shacham Columbia University Collaboration Meeting DoCoMo Eurolabs, Munich July 28, 2005.
COS 420 DAY 22. Agenda Assignment 4 Corrected 2 B’s Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due.
An SAIC Company Telcordia View of NENA Progress on VoIP Migration Plan Telcordia Contacts: Nadine Abbott (732) An SAIC Company.
Issues of HIP in an Operators Network Nick Papadoglou Thomas Dietz.
Ernst Langmantel Technical Director, Austrian Regulatory Authority for Broadcasting and Telecommunication (RTR GmbH) The opinions expressed in this presentation.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Emergency calls related work done in IETF Gabor Bajko May 22, 2006.
SDO Emergency Services Coordination Workshop (ESW06) 1 A Location-to-Service Translation Protocol (LoST) & Mapping Protocol Architecture Ted Hardie Andrew.
Bootstrap and Autoconfiguration (DHCP)
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
November st IETF MIP6 WG Mobile IPv6 Bootstrapping Architecture using DHCP draft-ohba-mip6-boot-arch-dhcp-00 Yoshihiro Ohba, Rafael Marin Lopez,
SYSTEM ADMINISTRATION Chapter 8 Internet Protocol (IP) Addressing.
3Com Confidential Proprietary 3G CDMA AAA Function Yingchun Xu 3COM.
IETF – ECRIT Emergency Context Resolution using Internet Technologies ESW 5 – Vienna October 2008 Marc Linsner.
Jun Li DHCP Option for Access Network Information draft-lijun-dhc-clf-nass-option-01.
November 2005IETF64 - ECRIT1 Emergency Service Identifiers draft-ietf-sipping-sos-01 draft-schulzrinne-sipping-service-01 Henning Schulzrinne Columbia.
1 Network Layer Lecture 12 Imran Ahmed University of Management & Technology.
July 2006IETF66 - ECRIT1 LoST: A Location-to-Service Translation Protocol draft-ietf-ecrit-lost-00 Ted Hardie Andrew Newton Henning Schulzrinne Hannes.
ECRIT Virtual Interim Meeting 3rd June 2009, 1PM EDT (New York) Marc Linsner Hannes Tschofenig.
ECRIT - Getting Certain URIs, and Alternatives to Getting Emergency Dialstring(s) draft-polk-ecrit-lost-server-uri-00 draft-polk-dhc-ecrit-uri-psap-esrp-00.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
ECRIT requirements update draft-schulzrinne-ecrit-requirements-01 IETF 63 Aug 02, 2005 Roger Marshall
Abstraction, Privacy, and the Internet. What is Abstraction? “The act of withdrawing or removing something” “The act or process of leaving out of consideration.
7/11/2005ECRIT Security Considerations1 ECRIT Security Considerations draft-taylor-ecrit-security-threats-00.txt Henning Schulzrinne, Raj Shanmugam, Hannes.
Emergency Context Resolution with Internet Technologies (ecrit) Hannes Tschofenig, Marc Linsner IETF 66, Montreal, June 2006.
Doc.: IEEE /2179r0 Submission July 2007 Steve Emeott, MotorolaSlide 1 Summary of Updates to MSA Overview and MKD Functionality Text Date:
LESSON Networking Fundamentals Understand IPv4.
IP and MAC Addresses, DNS Servers
Domain Name System (DNS)
Telecommunications Industry Association TR L
ECRIT Interim: SIP Location Conveyance
RELO: Retrieving End System Location Information draft-schulzrinne-geopriv-relo-03 Henning Schulzrinne March 2007 IETF68 - GEOPRIV.
Distributed Keyservers
Carrying Location Objects in RADIUS
draft-rosen-nena-ecrit-requirements Brian Rosen
draft-ietf-netconf-reverse-ssh
Location Configuration at Layer 7
BOOTP and DHCP Objectives
Introduction to Computers
Session Initiation Protocol (SIP)
draft-ietf-geopriv-lbyr-requirements-02 status update
Data collection methodology and NM paradigms
NETLMM Applicability Draft (Summary)
draft-ietf-ecrit-rough-loc
Hiding Network Computers Gateways
HTTP Enabled Location Delivery (HELD)
Emergency Service Identifiers draft-ietf-ecrit-service-urn-01
DHCP, DNS, Client Connection, Assignment 1 1.3
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Discussion on Suitable Parameters for SCHC]
IEEE IETF Liaison Report
RELO: Retrieving End System Location Information draft-schulzrinne-geopriv-relo-03 Henning Schulzrinne March 2007 IETF68 - GEOPRIV.
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Discussion on Suitable Parameters for SCHC]
Ted Hardie Andrew Newton Henning Schulzrinne Hannes Tschofenig
The Next Generation Proof-of-Concept System
Henning Schulzrinne Columbia University
Ch 17 - Binding Protocol Addresses
IEEE IETF Liaison Report
IEEE Emergency Services
Trustworthy Location ECRIT WG IETF 80 Tuesday, March 29, 2011
IEEE IETF Liaison Report
LUMP: Location-to-URL mapping draft-schulzrinne-ecrit-lump
Presentation transcript:

ECRIT Architectural Considerations draft-polk-newton-ecrit-arch-considerations-01 James Polk Andrew Newton

Genesis An observation about the ECRIT meeting in Paris: New comers were confused Old hands speak about differing universes The intent of this document: Provide enough information for new comers Specify common parameters for the old hands In the process, identify some issues.

Architecture There is no one, single type of network in which ECRIT will be deployed. There are many. However, we can identify processes that occur within each type of network on which ECRIT must rely: Bootstrapping Conversion Mapping Conveyance

Bootstrapping Delivery of configuration and location information to “seekers”. DHCP PPP LLDP Manual There are multiple configuration protocols. The ECRIT requirements upon bootstrapping are not clear.

Conversion Syntactic Geocoding & Reverse Geocoding If no PIDF-LO compatible mapping protocol, from the binary bootstrapping scheme to mapping scheme. From the binary bootstrapping scheme to PIDF-LO XML for conveyance. Geocoding & Reverse Geocoding x,y,z <--> 123 Main St. Civic addresses are user friendly But geospatial coordinates can be more precise No requirements for the delivery of both.

Mapping Location Context Mapping System (LCMS) Static: Dynamic “fixed location” devices can have the mapping done beforehand and handed to them. Dynamic When location is known to be fluid, mapping can be done “on-the-fly”. Combination Endsystem always asks (same) trusted server where it is (before or during call), even when it moves within the local network

Conveyance Information sent to the PSAP during the emergency call Location Conveyance PIDF-LO A URI to PIDF-LO? Identity Conveyance An authenticated identity A call-back reference

Unresolved Issues Emergency Identifiers Security Considerations Data Distribution Extensibility Conflation

Emergency Call Identifier(s) Is there just: One? Three? Seven? What about adhoc identifiers specific to certain regions? Must these identifiers take any certain form to fit into protocol elements?

Security Considerations LCMS volume is likely to be orders of magnitude higher than PSTN emergency call volume. If bootstrapping protocols are insecure, what is the point anyway? What is the real problem? Mapping forgery Mapping denial of service

Data Distribution Most likely resolved with new ‘Re5’ requirement.

Extensibility Resolved by new ‘Ma15’ requirement: The mapping protocol MUST be extensible to allow for the inclusion of new location fields.

Conflation No requirements regarding the resilience of the emergency call resolution process as it relates to inputs that have not been designed for this specific purpose. E.g. ECRIT may require streets to be abbreviated or postal names to be absent, but other location based applications require “typical” addresses.