Brian Rosen Abandoned Call and Premature Disconnect.

Slides:



Advertisements
Similar presentations
1 © 2001, Cisco Systems, Inc. All rights reserved. © 2004, Cisco Systems, Inc. All rights reserved. Location Conveyance in SIP draft-ietf-sipping-location-requirements-02.
Advertisements

Indication of support for keep- alive draft-holmberg-sip-keep-03 Christer Holmberg
MICS4 Survey Design Workshop Multiple Indicator Cluster Surveys Survey Design Workshop Survey Quality Control.
SIP Interconnect Guidelines draft-hancock-sip-interconnect-guidelines-02 David Hancock, Daryl Malas.
Premature Disconnect Brian Rosen NeuStar. Reminder of the problem Emergency Call is connected to PSAP Distressed caller hangs up before giving all information.
Non-200 response to PRACK (Due to rejected SDP offer or other reasons) Christer Holmberg
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Communication Service Identifier Requirements on SIP draft-loreto-3gpp-ics-requirements.txt
Mobile Application Architectures
1 Today’s System – Timeline. 22 Today’s versus NG9-1-1 Today’s 9-1-1Next Generation Virtually all calls are voice callers via telephones.
CIP Cyber Security – Security Management Controls
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
Social Media: FACEBOOK Kristin Martin Professional Development.
28.2 Functionality Application Software Provides Applications supply the high-level services that user access, and determine how users perceive the capabilities.
Stevenson/Whitmore: Strategies for Engineering Communication 1 of 11 Effective Conversation  Listen and encourage others to speak  Focus on the person.
By: Asaf Oren & Gilad Eisenberger Supervisor: Ittay Eyal Spring 2009 Networked Software Lab.
Service Layer Session Management Group Name: WG2-ARC Source: IDCC, LGE, ZTE Meeting Date: TP16 Agenda Item:
Requirements of the user interface: Use-case story board (1) The use-case storyboard –Complements use-cases by user-interface issues –Takes the use-cases‘
Listening “Seek first to understand… Then to be understood.”
Interim Text to Information & Training for TelecommunicatorsInformation & Training for Telecommunicators Version 2 August 26, 2013.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 17 Slide 1 Extreme Programming.
Basic Concepts of Computer Networks
NG911 technology Henning Schulzrinne
1 Version 3.1 Module 4 Learning About Other Devices.
Chapter 3 – Agile Software Development 1Chapter 3 Agile software development.
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
A Smartphone-based hazard reporting service in disaster areas Fahad Al Harbi Supervisor : Dr. Haifeng Shen.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Standards Committee Rules/Standards July Committee Members  Rodney CatesCarteret CountyJim SoukupCity of Durham  Perry DavisCleveland CountyChristy.
Understanding Networking Joe Cicero Northeast Wisconsin Technical College.
Extreme/Agile Programming Prabhaker Mateti. ACK These slides are collected from many authors along with a few of mine. Many thanks to all these authors.
TXT29-1-1® Copyright Intrado Inc – All rights reserved.
APPENDIX M1- Tripod Student and Teacher Surveys: The Seven C’s 1.Care pertains to teacher behaviors that help students to feel emotionally safe and to.
Switching Techniques Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
Graphical User Interface Prototypes by Sima Sodagar.
The First in GPON Verification Classic Mistakes Verification Leadership Seminar Racheli Ganot FlexLight Networks.
Draft-rosen-ecrit-emergency- framework-00 Brian Rosen NeuStar CPa
IETF – ECRIT Emergency Context Resolution using Internet Technologies ESW 5 – Vienna October 2008 Marc Linsner.
MP 2: Audio/ Video Streaming
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
ADV. NETWORK SECURITY CODY WATSON What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protections of External Resources.
Response to Call Back questions IETF 77 – Anaheim Stephen McCann, RIM.
Types of Service. Types of service (1) A network architecture may have multiple protocols at the same layer in order to provide different types of service.
ISCSI Extensions for RDMA (iSER) draft-ko-iwarp-iser-02 Mike Ko IBM August 2, 2004.
ConneCT Public Dashboard January DSS Work Items Online Applications 51,114 Applications submitted since soft launch 10/13 MyAccount Pre-Screening.
Unit 1: Communications. Telephone Skills at Work To use your telephone effectively, you need to manage its use. Once you are using the telephone you need.
By shahid iqbal.  Requirements Negotiation is another name for conflict resolution.  process addresses problems with requirements where conflicts occur.
Draft-ietf-ecrit-framework-06 Brian Rosen NeuStar.
Network Reliability and Interoperability Council VII NRIC Council Meeting Focus Group 1B Network Architectures for Emergency Communications in 2010 September.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
An Analysis of XMPP Security Team “Vision” Chris Nelson Ashwin Kulkarni Nitin Khatri Taulant Haka Yong Chen CMPE 209 Spring 2009.
Copyright (c) 2006 IBM Corporation; made available under the EPL v1.0 Update Policy ~ Where we are in 3.2.
1 Middleware and future telecom ’platform’ By Lill Kristiansen, ntnu.
ECRIT requirements update draft-schulzrinne-ecrit-requirements-01 IETF 63 Aug 02, 2005 Roger Marshall
Call Management (TEMPO) 22 nd July This presentation covers the following:  The Call Management requirement  Call Management Workflow Introduction.
OPERATIONS TEXT TO TEXT TO OPERATIONS Other agency experiences RRRDC expectations Timeline Training RRRDC Standard Operating Procedures Calls.
112 Emergency Call System in Poland Caller Location Workshop on emergency number 112 Tbilisi, November 2013 Maria Skarzyńska Ministry of Administration.
Daily Phone Usage This Presentation Will Outline the Retail Store Phone Operation & Inter-Office Communications Press or click the slide to advance.
Chapter 3 Agile software development 1 Chapter 3 – Agile Software Development.
Chapter 9: Transport Layer
Guilford Metro Texting to
Instructor Materials Chapter 9: Transport Layer
Text to 911 Quiz.
draft-rosen-nena-ecrit-requirements Brian Rosen
Text to 911 Quiz.
Use cases for the real-time application of slim
Emergency Call With Team on the Run, users can make emergency PTT calls to a preset list of recipients, informing them about critical situations. The feature.
call completion services
Presentation transcript:

Brian Rosen Abandoned Call and Premature Disconnect

New Version Made clear what the text was talking about: human or UA Defined when Abandoned Call starts (after feature negotiation between UAs) Added text in PD-3 to clarify when it applies, and what it does/doesn't imply Added text in PD-5 to clarify it doesn't apply for multi-lines, and that there should be an override Added text in PD-6 to clarify was is/isn't implied, and defined "rapidly"

Premature Disconnect PD-1 It must be possible to have the call taker rapidly re- establish communications with a caller that attempts to prematurely disconnect from the call. PD-2 It must be possible for the call taker to know when the caller has attempted to prematurely disconnect. PD-3 Reconnecting the caller must work reasonably reliably under congestion conditions, especially those where call admission control is implemented. PD-4 When PD-1 is enforced, the call taker must be able to cause alerting at the UAC which has attempted to prematurely disconnect from the emergency call.

Premature Disconnect (con’t) PD-5 When PD-1 is enforced, the caller must not be able to place another call until the PSAP allows the call to be released. This requirement is not intended to imply a user interface with multiple lines accessible independently is locked to the single line that placed the emergency call. As mistakes can be made, an override mechanism invoked by the caller must be feasible. The implementation must fail safely such that the phone cannot be locked and unable to call for help. PD-6 All Media and signaling streams flowing between the UAC and UAS must be maintained to the extent needed for rapid reconnection. This specifically does not imply that the call taker be able to receive live media from the UAC while the user believes the call is disconnected. "Rapidly" is in human terms: the time from when the caller reacts to the mechanism, initiating reconnect, and the time the call taker can resume conversing, and is perhaps a second. PD-7 Control of premature disconnect is not needed in all jurisdictions. It must be possible to not invoke the function and allow premature disconnect to terminate the call as if no special features were present.

Abandoned Call AC-1 It must be possible for the PSAP or the network that serves it to cause abandoned calls to complete and stay connected. AC-2 AC-1 shall be applied at the earliest possible time in the call establishment process. Abandoned calls are defined as those where roundtrip signaling messages are completed between the UAS and the UAC necessary to invoke the mechanism. Calls disconnected before that time are not considered abandoned. AC-3 Control of abandoned call is not needed in all jurisdictions. It must be possible to not invoke the function and allow calls to be abandoned as if no special features were present. Enabling or disabling must be dynamic, so that it can be enforced or not depending on conditions at the UAS.

NENA asked for two more edits PD-2 It must be possible for the call taker to know when the caller has attempted to prematurely disconnect and conversely, when a caller attempts to reconnect after having previously attempted to disconnect. This change is necessary to capture the capability for the call taker to know when a caller is attempting to reconnect. PD-4 When PD-1 is enforced, the call taker must be able to cause alerting at the UAC in situations where the caller has attempted to prematurely disconnect from the emergency call or, when the caller has gone silent without having disconnected. Rationale: The caller may believe they have disconnected or is unable to speak. The ability to alert is needed to encourage the caller, or someone in its surroundings, to reconnect with the call taker. This change is necessary to capture the capability for the call taker to cause alerting at the UAC when the caller is deemed to be still connected but is not verbally responding.

Next Steps Accept as work group item Presumably, assign to design team to finish and suggest a mechanism