Ieprep
   Internet Draft                                              H. Folts
   Document: draft-ietf-ieprep-requirements-01.txt                  NCS
   Expires: April 2003                                         C. Beard
                                                                   UMKC
                                                            K. Carlberg
                                                                    UCL
                                                           October 2002


               Requirements for Emergency Telecommunication
                       Capabilities in the Internet


Status of this Memo

   This document is an Internet-Draft and is in full conformance with
   all provisions of Section 10 of RFC2026 [1].

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
        http://www.ietf.org/ietf/1id-abstracts.txt
   The list of Internet-Draft Shadow Directories can be accessed at
        http://www.ietf.org/shadow.html.

   For potential updates to the above required-text see:
   http://www.ietf.org/ietf/1id-guidelines.txt


Abstract

   This document outlines user requirements for IP-based networks to
   enable and support an authorized emergency telecommunications service
   (ETS)for use by authorities to organize and coordinate emergency and
   disaster relief operations.  It provides a basis from which ETS can
   be negotiated to provide user-acceptable communications.  The
   requirements in this document relate to user expectation and are
   general, functional, and intended to provide wide latitude in
   implementation options.  This document also provides in-depth
   background on the state of emergency telecommunication capabilities
   as they exist today and the motivation for supporting these in IP








         Rqmts for Emergency Telecom Capabilities In Internet Oct. 2002


   networks.  Specific system requirements involving end-to-end and
   network issues are presented in [2].


Conventions used in this document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC-2119 [3].

Table of Contents

   1. Introduction...................................................2
      1.1 Current PSTN Capabilities..................................4
      1.2 Network Technology Transition..............................5
      1.3 Purpose and Scope of this Document.........................6
   2. User Requirements..............................................6
   3. Emergency Service Applications.................................7
      3.1 Inelastic applications.....................................8
      3.2 Elastic applications.......................................8
   4. Policy Issues..................................................8
   5.  Security Considerations.......................................9
   6.  References....................................................9
   7.  Acknowledgments...............................................9
   8.  Author's Addresses............................................9
   9.  Copyright....................................................10


1.   Introduction

   Natural and man-made disasters can occur anywhere, anytime.  These
   include, for example, earthquakes, floods, airplane crashes, and
   terrorist attacks.  While some advance planning is possible for
   expected disaster events, most disasters happen unexpectedly.
   Readily available telecommunication capabilities are essential for
   emergency and disaster relief operations to quickly start saving
   lives and restoring the community infrastructure.  A number of
   telecommunication facilities can be involved in disaster operations.
   These include local mobile radio, dedicated satellite systems,
   transportable capabilities, and the public telecommunications
   infrastructure.  Some of these facilities need to be deployed to the
   disaster site and very likely may not be immediately available.  The
   public telecommunication services, however, are generally at hand
   except in the most remote areas.  The publicly available capabilities
   include the traditional telephone network and the Internet, which can
   both be accessed via wire line, wireless, and various broadband
   facilities.  Disaster recovery operations can significantly benefit
   from a variety of modes for interchange of critical information to
   organize and coordinate the emergency activities.  Emergency voice


Folts                    Expires - April 2003                 [Page 2]


         Rqmts for Emergency Telecom Capabilities In Internet Oct. 2002


   communications are supported today by a preferential service through
   public telephone networks in some countries.  The Definition of the
   International Preference Scheme (ieps) for circuit-switched telephone
   networks is provided in ITU-T Recommendation E.106 [4].

   Now, however, an evolution is taking place in traditional public
   telecommunication networks toward integrating circuit-switched and
   packet-based technologies.  This promises to provide a rich menu of
   fully integrated capabilities for handling voice, message, data, and
   video traffic to greatly enhance disaster recovery operations.  These
   capabilities are being considered in the development of a
   comprehensive emergency telecommunication service (ETS) to be
   deployed in the new generation of packet-based public networks.  ETS
   is now the globally recognized term that identifies the new
   generation of emergency communications capabilities in public
   telecommunication networks for authorized users to use during
   emergency and disaster relief operations.

   The bulk of conventional telephony is accomplished over relatively
   narrow band wire line or wireless facilities of the public switched
   telephone network (PSTN).  These constrained links are also used for
   various other applications like instant messaging, email, and
   telemedicine telemetry.  In addition, wideband capabilities for video
   broadcast, conferencing, and telemedicine will continue to flourish
   and greatly enhance emergency recovery operations.

   During serious disaster events, public networking facilities can
   experience severe stress due to damaged infrastructure and heavy
   traffic loads.  As bandwidth gets severely constrained, it becomes
   difficult to establish and maintain effective communication sessions.
   It is essential that disaster recovery operations be able to readily
   communicate to organize and coordinate essential activities.
   Authorized emergency communication sessions need to have ready access
   to available network resources and be given an enhanced probability
   of successful completion of these critical communications to help
   save lives and restore community infrastructure.

   Only people authorized by the appropriate authority are permitted to
   establish enhanced emergency communication sessions through public
   networking facilities for facilitating immediate disaster recovery
   operations.  We use the term ôenhancedö to refer to additional
   measures taken to achieve and sustain communications by selected
   authorized personnel.  Those typically authorized are local police,
   fire, and medical personnel as well as designated government
   officials from local, regional, and national levels who are
   responsible for various aspects of disaster recovery operations.

   All emergency communication sessions should be processed as normal
   traffic along with all non-emergency traffic when sufficient network


Folts                    Expires - April 2003                 [Page 3]


         Rqmts for Emergency Telecom Capabilities In Internet Oct. 2002


   bandwidth and resources are available.  ONLY when networks reach
   traffic saturation is there a need for giving emergency communication
   sessions a higher probability of completion over non-emergency
   communications.  While this occurrence may never happen in the
   typical Internet-based environment, capabilities for accommodating
   emergency traffic need to be established in preparation for a serious
   catastrophe.  These provisions should be in place before a potential
   disaster, even for highly over-provisioned networks.  It is better to
   be prepared ahead of time and not wait for the worst to happen first.

   The ETS capabilities for handling authorized emergency traffic should
   be accomplished using existing applications, Internet features, and
   standards whenever possible.  Establishment of new and different
   standards would be both costly and unlikely to ever be implemented.
   The desired approach is to adopt existing standards and where needed
   adapt new standards with any necessary adjustments needed to support
   preferential treatment of emergency traffic during severe periods of
   congestion.

   This document outlines user requirements that need to be met in
   public and private IP-based networks to enable communications for
   ETS.  These requirements would include support for existing systems
   that address National Security/Emergency Preparedness (NS/EP)
   requirements and capabilities.  Recovery activities can involve
   person-to-person communications, group coordination, disaster
   assessment application execution, remote information retrieval,
   continuity of government, etc.


1.1     Current PSTN Capabilities

   As a starting point, the model to consider for emergency
   communication services is the existing service capability in the
   United States PSTN, the Government Emergency Telecommunications
   Service (GETS).  Some other countries have similar services.  GETS is
   based upon the requirements presented in ITU-T Recommendations E.106
   [4].

   The purpose of GETS is to increase the probability of completion of a
   telephone call for authorized operations personnel in times of
   emergencies.  It does not guarantee that service will be available,
   but it does implement a set of functions that increase the likelihood
   of finding an available circuit to complete a call in the PSTN.

   The key aspects of GETS are as follows:

          o Personnel gain access to GETS by calling a specified
            telephone number and presenting a credit-card type of
            authentication.


Folts                    Expires - April 2003                 [Page 4]


         Rqmts for Emergency Telecom Capabilities In Internet Oct. 2002



          o Once being authenticated, the call is completed on a
            preferential high probability of call completion basis.  If
            calls are initially blocked, they can be queued and
            switched to alternate carriers.

          o If fundamental telephone services are compromised, services
            contracted under GETS are restored first.  This is under
            the provisions of TSP (Telecommunication Service Priority
            [5]), which is independent of GETS.

   These features enhance the capability of NS/EP calls to be completed
   with a high probability in congested networks.  GETS will not preempt
   public telephone calls, nor are there multiple levels of precedence
   within GETS.

1.2    Network Technology Transition

   The public telecommunication infrastructure is in the process of
   evolving from the traditional circuit-switched technology to
   Internet-based packet technology.  In developing new ETS capabilities
   for the future, consideration needs to be given during the period of
   transitions, which is often referred to as "convergence".

   During convergence, IP packet-based technology is being integrated
   into the public telecommunications infrastructure.  It is important
   that the existing basic capability for preferential handling of
   emergency traffic in current telephone networks is preserved during
   the transition period.  There are four basic configurations that come
   into play during convergence.  These include:

          o  PSTN-to-PSTN via IP backbone
          o  IP telephony to PSTN via gateway
          o  PSTN to IP Telephony via gateway
          o  Pure IP telephony, with no link to the PSTN

   These are described in ETSI Technical Report [6].

   As the IP packet-technology becomes the dominant part of the public
   telecommunications infrastructure, the prospect of many enhanced
   capabilities and services comes forth.  These could include expanded
   features in IP-telephony to support an enhanced probability of call
   completion and additional call processing features.  The provision of
   additional communication services such as Email, instant messaging,
   telemedicine, white board, and telemetry can provide emergency
   recovery operations with a rich menu of capabilities.  Some time in
   the future, it is envisioned that the multimedia services will become
   the dominate mode for emergency communications.



Folts                    Expires - April 2003                 [Page 5]


         Rqmts for Emergency Telecom Capabilities In Internet Oct. 2002


1.3     Purpose and Scope of this Document

   The purpose of this document is to articulate user requirements
   concerning support for emergency related communications.  It provides
   a set of requirements that need to be met by service(s) to acceptably
   support emergency communications.  The requirements given here are
   quite general and it is intended that wide latitude be available to
   service providers and/or vendors to implement emergency services as
   they consider appropriate.

   Section 2 provides a summary of the user requirements that identify
   high-level service capabilities that should be provided.  Section 3
   provides a list of possible emergency communication applications that
   could be used by emergency personnel.  And finally, Section 4
   identifies policy issues that need to be considered in the deployment
   and operation of an ETS.

   System requirements that focus on how user requirements (taken as a
   whole) are to be satisfied with respect to the network & gateways
   (i.e., network layer to application layer) are specified in other
   documents.  [2] specifies a set of general system requirements and
   [7] articulates a set of more specific set of system requirements for
   IP telephony.

2.   User Requirements

   The basic user requirements that need to be considered in providing
   emergency telecommunication capabilities to support recovery
   operations from serious disaster situations are summarized as
   follows.  Note that we assume the presence of Service Level
   Agreements in cases where user requirements cover expectations of
   service providers:

          o Users should be able to use public telecommunication
            resources for supporting emergency communications to help
            organize and coordinate immediate disaster recovery
            operations.

          o Users that access emergency telecommunications service must
            be authenticated.  This should be accomplished in a timely
            manner.

          o When networks reach traffic saturation emergency
            communication sessions should be provided with with a
            higher probability of completion over non-emergency
            communications.  We assume the presence of a service level
            agreement to accomplish this latter case. (Note: Sessions
            identified as emergency communication could be processed as



Folts                    Expires - April 2003                 [Page 6]


         Rqmts for Emergency Telecom Capabilities In Internet Oct. 2002


            normal traffic along with all non-emergency traffic when
            sufficient network bandwidth and resources are available.)

          o Once an emergency communications session is established,
            the user should be able to complete the session without
            being interrupted or having the quality of the
            communications be degraded excessively.

          o There must exist a mapping association between labels
            defined by various standards bodies.  This mapping will
            help facilitate inter-working of services in cases where
            gateways and networks support emergency telecommunications
            services.

          o Emergency traffic should be able to transit multiple
            service providers.  The existence of service level
            agreements determines the extent by which this can be
            accomplished.

          o Networks should be able to support a variety of user
            applications including telephony, video, database access,
            messaging, telemetry, and web browsing to support emergency
            operations.

          o Authorized emergency communications should be protected
            from intrusion or interference, such as, spoofing, change
            of content, and denial of service.  If the protection
            cannot be accomplished, then users must be able to detect
            this failure.

          o Users should have the option protecting certain sensitive
            traffic from eavesdropping and the source/destination of
            some traffic.

          o Users should have the option of requesting degraded quality
            of service when normal or expected QoS cannot be achieved.

   It may not be possible to fulfill all of these requirements
   immediately and within existing standards, Internet features, and
   applications.  However, provision of the best probability of
   successful completion of critical emergency communications will
   significantly enhance the ability of disaster recovery operations to
   save lives and restore community infrastructure.


3.   Emergency Service Applications

   A variety of IP based applications are expected to be used to support
   disaster recovery and response operations in the future as future


Folts                    Expires - April 2003                 [Page 7]


         Rqmts for Emergency Telecom Capabilities In Internet Oct. 2002


   services become available to the user.  They include not only the
   basic IP telephony services but expand to include a selection of
   multimedia services to enhance the ability for saving lives and
   restoring community infrastructure impacted by serious disaster
   events.  This implies that various upper layer characteristics will
   be operating over IP.

   The following list is not exhaustive, but is illustrative of the
   types of capabilities that could prove to be beneficial:

3.1     Inelastic applications

          o Real time interactive voice (telephony)
          o Real time interactive video conference
          o Real time interactive video telemedicine
          o Real time interactive white board
          o Streaming audio and video
          o Telemedicine telemetry for vital sign monitoring
          o Virtual reality imaging for disaster scene surveillance

3.2     Elastic applications

          o Interactive victim database (e.g.  I Am Alive - IAA)
          o Interactive database services for crisis management
          o Interactive Web access
          o Electronic Mail
          o Instant messaging and presence
          o File transfer

   The application of immediate interest to current emergency management
   organizations is tends to center on IP telephony.  In the future,
   however, it is anticipated that voice communications will be
   overshadowed by a number of emerging multimedia modes of
   communication that will significantly benefit emergency recovery
   operations.


4.   Policy Issues

   In the development and deployment of ETS capabilities, a number of
   policy decisions are required that will define how the services are
   to be applied, configured, and used.  The user policies will be
   conveyed to the service provider in the service level agreement (SLA)
   established for the provision of the ETS capabilities.  Service
   providers will have the freedom to determine its own internal
   policies in how the service is actually implemented in fulfillment of
   the SLA.




Folts                    Expires - April 2003                 [Page 8]


         Rqmts for Emergency Telecom Capabilities In Internet Oct. 2002



5.  Security Considerations

   Discussion on security is addressed in Section 2.


6.  References

   1  Bradner, S., Internet Standards Process û Revision 3, BCP 9, RFC
   2026, October 1996.

   2  Carlberg, K., Atkinson, R., "General Requirements for Emergency
      Telecommunications Service", Internet Draft, Work in Progress,
      September, 2002.

   3  Bradner, S., ôKey Words for Use in RFCs to Indicate Requirement
      Levelsö, BCP 14, RFC 2119, March 1997.

   4  ITU-T, "Description of an International Emergency Preference
      Scheme", ITU-T Recommendation E.106, March 2000.

   5  ôInformation Interchange Representation of National Security
      Emergency Preparedness û Telecommunications Service Priorityö,
      American National Standard T1.211-1989 (R1999).

   6  ETSI TR 101 300, V2.1.1, "Telecommunications and Internet Protocol
      Harmonization Over Networks (TIPHON); Description of Technical
      Issues", October 1999

   7  Carlberg, K., Atkinson, R., "IP Telephony Requirements for
      Emergency Telecommunications Service", Internet Draft, Work in
      Progress, September, 2002


7.  Acknowledgments

   Many thanks to Fred Baker, Scott Bradner, Ian Brown, and Ran Atkinson
   for their comments on this draft.


8.  Author's Addresses

   Hal Folts
   National Communications System
   701 South Courthouse Road
   Arlington, VA 22204-2198 USA
   Phone: +1 703 607-6186
   Email: foltsh@ncs.gov



Folts                    Expires - April 2003                 [Page 9]


         Rqmts for Emergency Telecom Capabilities In Internet Oct. 2002


   Cory Beard
   School of Interdisciplinary Computing and Engineering
   University of Missouri-Kansas City
   5100 Rockhill Road
   Kansas City, MO  64110
   Phone:  1-816-235-1550
   Email:  beardc@umkc.edu

   Ken Carlberg
   University College London
   Department of Computer Science
   London, WC1E 6BT
   United Kingdom
   k.carlberg@cs.ucl.ac.uk



9.  Copyright

   "Copyright (C) The Internet Society (date).  All Rights
   Reserved.  This document and translations of it may be copied and
   furnished to others, and derivative works that comment on or
   otherwise
   explain it or assist in its implementation may be prepared, copied,
   published and distributed, in whole or in part, without restriction
   of
   any kind, provided that the above copyright notice and this paragraph
   are included on all such copies and derivative works.  However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the purpose of
   developing
   Internet standards in which case the procedures for copyrights
   defined
   in the Internet Standards process must be followed, or as required to
   translate it into languages other than English.

   The limited permissions granted above are perpetual and will not be
   revoked by the Internet Society or its successors or assigns.  This
   document and the information contained herein is provided as an "AS
   IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK
   FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT
   LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL
   NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OR MERCHANTABILITY
   OR FITNESS FOR A PARTICULAR PURPOSE.






Folts                    Expires - April 2003                [Page 10]