< draft-marshall-geopriv-lbyr-requirements-00.txt   draft-marshall-geopriv-lbyr-requirements-01.txt >
GeoPriv R. Marshall, Ed. GeoPriv R. Marshall, Ed.
Internet-Draft TCS Internet-Draft TCS
Expires: August 9, 2007 February 5, 2007 Intended status: Standards Track March 4, 2007
Expires: September 5, 2007
Requirements for a Location-by-Reference Mechanism used in Location Requirements for a Location-by-Reference Mechanism used in Location
Configuration and Conveyance Configuration and Conveyance
draft-marshall-geopriv-lbyr-requirements-00 draft-marshall-geopriv-lbyr-requirements-01
Status of this Memo Status of this Memo
By submitting this Internet-Draft, each author represents that any By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79. aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
skipping to change at page 1, line 34 skipping to change at page 1, line 35
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on August 9, 2007. This Internet-Draft will expire on September 5, 2007.
Copyright Notice Copyright Notice
Copyright (C) The IETF Trust (2007). Copyright (C) The IETF Trust (2007).
Abstract Abstract
This document defines terminology and enumerates requirements for a This document defines terminology and enumerates requirements for a
location-by-reference approach to location configuration and location-by-reference approach to location configuration and
conveyance interactions useful for emergency call routing for voice- conveyance interactions useful for emergency call routing for voice-
over-IP (VoIP) and general Internet multimedia systems, where over-IP (VoIP) and general Internet multimedia systems, where
Internet protocols are used end-to-end. Internet protocols are used end-to-end.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Requirements Terminology . . . . . . . . . . . . . . . . . . . 4 2. Requirements Terminology . . . . . . . . . . . . . . . . . . . 5
3. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 5 3. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.1. Terms . . . . . . . . . . . . . . . . . . . . . . . . . . 5 3.1. Terms . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.2. Actors . . . . . . . . . . . . . . . . . . . . . . . . . . 5 4. Examples of various LRI Model . . . . . . . . . . . . . . . . 8
3.3. Location . . . . . . . . . . . . . . . . . . . . . . . . . 5 5. High-Level Requirements . . . . . . . . . . . . . . . . . . . 12
4. Basic Actors . . . . . . . . . . . . . . . . . . . . . . . . . 7 6. Security Considerations . . . . . . . . . . . . . . . . . . . 14
5. High-Level Requirements . . . . . . . . . . . . . . . . . . . 9 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 15
6. Security Considerations . . . . . . . . . . . . . . . . . . . 11 8. Contributors . . . . . . . . . . . . . . . . . . . . . . . . . 16
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 12 9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 17
8. Contributors . . . . . . . . . . . . . . . . . . . . . . . . . 13 10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 18
9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 14 10.1. Normative References . . . . . . . . . . . . . . . . . . . 18
10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 15 10.2. Informative References . . . . . . . . . . . . . . . . . . 18
10.1. Normative References . . . . . . . . . . . . . . . . . . . 15 Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 20
10.2. Informative References . . . . . . . . . . . . . . . . . . 15 Intellectual Property and Copyright Statements . . . . . . . . . . 21
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 17
Intellectual Property and Copyright Statements . . . . . . . . . . 18
1. Introduction 1. Introduction
This document identifies the individual requirements underlying how a
Location-by-Reference (LbyR) mechanism is to be used over the
Internet, applied to either a Conveyance protocol or to a
Configuration protocol. The LbyR approach is in contrast to the
Location-by-Value (LbyV) model, which uses a "location object" (e.g.,
PIDF-LO) exclusively. Examples using the Location-by-Value method
are beyond the scope of this document.
A mechanism for either (or both) location configuration and location A mechanism for either (or both) location configuration and location
conveyance may rely on either a location-by-value approach, conveyance may rely on either a location-by-value approach,
containing and transporting location information along every leg of containing and transporting location information along every leg of
the signaling path, or alternatively, a different approach, using a the signaling path, or alternatively, a different approach, using a
location-by-reference technique, which may be used to reference a location-by-reference technique, which may be used to reference a
location with some identifier, and to de-reference the location when location with some identifier, and to de-reference the location when
needed for a location-based decision. needed for a location-based decision.
This document uses as a baseline condition, the primary example of an [http://www.ietf.org/internet-drafts/
emergency call, which includes a request for emergency services via a draft-ietf-sip-location-conveyance-07.txt] For an application of LbyR
SIP-enabled end device, connecting through the Internet to an IP- Conveyance, we choose to use the example of SIP signaling within an
enabled PSAP (Public Service Answering Point). emergency services context, though we also talk about LbyR in a more
general sense. In this case, a SIP user agent, or SIP proxy server
acting on behalf of a user agent, to another user agent via the SIP
protocol [RFC3261]. In place of the actual value for a "Location", a
Location Reference ID (LRI) is used to represent the "value" of the
location, stored in some Internet-connected host, which we call a
location server.
For a LbyR Configuration protocol mechanism, even for the emergency
service context mentioned, many different protocol choices exist.
These include DHCP, LLDP-MED, and several Layer 7 protocols being
considered for standardization. Regardless of the variety of
choices, the general concept of how LbyR is used for configuration,
is not specific to any particular protocol choice.
A Location which is referenced can be either Geographic location [RFC
3693] (e.g., lat/lon), or a Civic location (e.g., street address).
We reintroduce a few basic entities [RFC3693] into the Location-by-
Reference discussion. These include a "target" as the entity whose
location is being transmitted, (e.g., a user agent's (UA) location.
A "using protocol", defined as how a "location server" transmits a
"location reference identifier" to a "location recipient". Privacy
of a target's location, with repect to identity is important to
protect, hence all examples shown assume that any user identity
associated with the target is not included with location.
Location can be pushed from one host to another, as part of a
signaling protocol, in order to be used for location-based routing
(or other purposes, outside the scope here), or it can alternatively
be queried via a client request to a server which provides location
[ref. drafft-sip-conveyance- TBD]. In the case of LbyR Conveyance,
the actual location (i.e., location object) never gets pushed along,
but is replaced by a Location Reference Identifier. In the case of a
client which queries a server for location, the query is either to
obtain a Location Reference Identifier, or to obtain an actual
Location (e.g., location object) based the input of an LRI in the
query.
The draft-sip-conveyance- document details how SIP proxies treat LbyV
or LbyR scenarios for conveying location via the SIP protocol.
Whereas location objects are readily consumable by the hosts that
using protocols deliver to, a Location Reference ID must first go
through a dereference step in order to be useful.
In our SIP example, for LbyR, instead of having a content identifier
(cid:) pointing to a location object within a SIP body, the LRI is
carried in the Geolocation header of a SIP message which is used to
get a location via a dereference.
A common example use case is the "emergency services call" case,
where an request for emergency services is initiated over the
Internet via the SIP protocol (i.e., a '9-1-1' or '1-1-2' call). In
order to route the call to the appropriate PSAP, the UA client
location is required.
This document uses as a baseline scenario, the example of an
emergency call, where an request for emergency services is initiated
over the Internet using the SIP protocol (e.g., a '9-1-1' or '1-1-2'
call). In order to route the call to the appropriate PSAP, since
PSAPs are divided regionally, the UA client location is required.
We first define terminology in Section 3. The document then outlines We first define terminology in Section 3. The document then outlines
baseline requirements (Section 5), around the referencing and baseline requirements (Section 5), around the referencing and
dereferencing of location via some location identifier in lieu of the dereferencing of location via some location identifier in lieu of the
emergency caller's actual location. emergency caller's actual location.
Identification of the caller, as associated information to location Identification of the caller, as associated information to location
or location reference, either in conveyance or configuration, is out or location reference, either in conveyance or configuration, is out
of scope in this document. of scope in this document.
Location-by-reference is a mechanism which is in use in VoIP 9-1-1 Location-by-reference is a mechanism which is in use in VoIP 9-1-1
systems at the time of this writing, and justified based on the systems at the time of this writing, and justified based on the
requirements listed in this document. requirements listed in this document.
2. Requirements Terminology 2. Requirements Terminology
In this document, the key words "MUST", "MUST NOT", "REQUIRED", In this document, the key words "MUST", "MUST NOT", "REQUIRED",
"SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY",
and "OPTIONAL" are to be interpreted as described in RFC 2119 [1], and "OPTIONAL" in this document are to be interpreted as described in
with the qualification that unless otherwise stated these words apply RFC 2119 [RFC2119].
to the design of the location-by-reference mechanism, and not its
implementation or application.
3. Terminology 3. Terminology
3.1. Terms 3.1. Terms
Location Reference Identifier (LRI): An identifier (could be of the Several of the terms presented below are based on RFC3693, and in
form of any URI) which is designed to represent a location object. some cases, extended to include additional language to support the
Location-by-Reference model.
Dereference Protocol: A protocol which is used to query a Location
server based on an LRI as input.
Location Reference Identifier (LRI): An identifier (e.g., URI) which
is a pointer to a target's location record on a remote host (e.g.,
location server), and is used by a dereferencing protocol for
retrieval of that specific location.
Location Server (LS): A network host which is designed to store Location Server (LS): A network host which is designed to store
location and to provide that same location to appropriate location location and to provide that same location to appropriate location
client requests. client requests. May also be referred to as a Location
Information Server (LIS).
Location-to Mapping Server (LMS): A network host which provides a
URI mapping service based on an input location and service
identifier.
Call Server/Proxy (CS/P): A network host which plays the role of a LoST Mapping Server (LMS): A network host which provides a URI
SIP Proxy. response based on input of a location and service identifier [ref.
draft-ecrit-lost-].
3.2. Actors Using Protocol: A protocol that carries a Location Object or an
Location Reference Identifier (i.e., LRI).
de-reference protocol client: The term to describe the entity Target: A person or other entity whose location is communicated by a
requesting a Location Object in exchange for a Location Reference Geopriv Location Object.
Identifier provided.
de-reference protocol server: The term to describe the entity Location Recipient (LR): The entity that receives location
providing a Location Object as an output based on a Location information. It may have asked for this location explicitly (by
Reference Identifier input. sending a query containing an LRI to a location server), or it may
receive this location asynchronously. Also may be referred to as
a Dereference client within this document, in the context of the
Location-by-Reference model.
3.3. Location Location Server (LS): The entity to which a LG publishes location
objects, the recipient of queries from location receivers, and the
entity that applies rules designed by the rule maker. Also may be
referred to as a Dereference server within this document, in the
context of the Location-by-Reference model.
Location: A geographic identification assigned to a region or Location: A geographic identification assigned to a region or
feature based on a specific coordinate system, or by other precise feature based on a specific coordinate system, or by other precise
information such as a street number and name. It can be either a information such as a street number and name. It can be either a
civic or geographic location. civic or geographic location.
Civic location: A described location based on some reference system, Civic location: A described location based on some reference system,
such a jurisdictions or postal delivery. A street address is a such a jurisdictions or postal delivery. A street address is a
common example. common example.
skipping to change at page 7, line 5 skipping to change at page 8, line 5
Location-by-Value: The mechanism of representing location either in Location-by-Value: The mechanism of representing location either in
conveyance protocols or configuration protocols as fully conveyance protocols or configuration protocols as fully
specified, (i.e., including the actual location value itself). specified, (i.e., including the actual location value itself).
Location-by-Reference: The mechanism of representing location either Location-by-Reference: The mechanism of representing location either
in conveyance protocols or configuration protocols as an in conveyance protocols or configuration protocols as an
identifier which refers to a fully specified location, (i.e., identifier which refers to a fully specified location, (i.e.,
including a pointer to the actual location value itself). including a pointer to the actual location value itself).
4. Basic Actors 4. Examples of various LRI Model
To support the referencing or de-referencing of a location, it is To support the referencing or de-referencing of a location, it is
appropriate to describe a diagram consisting of network elements appropriate to describe a diagram consisting of network elements
around which this might be done. These elements include, the UA around which this might be done. These elements include, the UA
(User Agent), CS/P (Call Server/Proxy), a LS (Location Server), and a (User Agent), P (Proxy), LS (Location Server), and a UA at the PSAP
PSAP UA. (UA2).
This section outlines which entities will be considered in the This section outlines which entities will be considered in the
referernce de-reference scenarios discussed. referernce/dereference scenarios discussed.
+-------+ <t>
| | |------------------------------- <figure anchor="LRI Indirection" title="LRI query/response - where
| LMS |---|---------------- \ Target = Location Recipient.">
| | |--- \ \ <artwork><![CDATA[
+-------+ \ \ \
\ \ \
\ \ \
\ \ \
+-------+ +-------+ +-------+ +-------+
| | | | | | | |
| UA1 |------| P1 |------| P2 |------| UA2 |
| | | | | | | |
+-------+ +-------+ +-------+ +-------+
| / / /
| / / /
| / / /
+-------+ / / /
| | |-- / /
| LS |---|---------------- /
| | |------------------------------
+-------+
Figure 1: Framework for referencing or de-referencing location in a +--------+ +--------+
| Target |<---------response w/LO-------| |
| == | | LS |
| LR |-----------query w/LRI------->| |
+--------+ +--------+
Figure 1: Framework for referencing or de-referencing location in a
SIP session. SIP session.
Above figure shows simplest LRI interaction, when target happens to
also be the Location Recipient [ref. RFC3693 terms]
+--------+ +--------+ +--------+
| | | | | |
| Target |<----------acquire LO---------| LS |<--deref--| LR |
| | | | LRI | |
+--------+ +--------+ +--------+
| |
+----------------convey LRI--------------------------------->+
Figure 2: Setup showing LRI indirection.
The above interaction reduces to two basic interactions: 1. Location
provision from LS/LIS to target by reference (LRI). 2. Location
indirection by the LS/LIS, at the request of the Target. Location
updates, are possible in either case.
+--------+ +--------+ +--------+
| | | | | |-------LO------+
| Target |<........>| LG |--LI/LO-->| LS/DS | |
| | | | | |<---LRI---+ |
+--------+ +--------+ +--------+ | |
| |
| v
+--------+ +--------+ +--------+
| | | | | |
| LRG |---LRI--->| LT |--LRI-->| LR/DC |
| | | | | |
+--------+ +--------+ +--------+
Figure 3: General Setup - LG interaction.
Definitions: Target, LG, LR, LI, LO as in RFC 3693. LRG = Location
Reference Generator (creates reference) LT = Location Transmitter
(one party to Conveyance Protocol) DS/DC = Dereference Server /
Client Protocols: Dereference Protocol is between DS and DC
Conveyance Protocol is between LT and LR
+--------+
| |
+--------------| LS |-----------------------------------+
| | | |
| + -------+ |
LCP ^ LDP
| LDP |
V V V
+--------+ +--------+ +--------+ +--------+
| | | | | | | |
| UA1 |--------->| P1 |--------->| P2 |--------->| UA2 |
| | | | | | | |
+--------+ +--------+ +--------+ +--------+
^
LMP
V
+--------+
| |
| LMS |
| |
+--------+
Figure 4: Example of a SIP call.
Definitions: LS = Location Server (as in RFC 3693) LCP = Location
Configuration Protocol LDP = Location Dereference Protocol LMP =
Location Mapping Protocol Sequence: 1. UA1 acquires LRI from its LS
(acting as LRG) 2. UA1 sends an INVITE to a service URN via P1 3.
P1 dereferences the LRI and uses it to get a URI from the LMS 4. UA2
may also wish to dereference the LRI, e.g., to get the current
location of UA1.
Figure 1 shows the interaction between the entities involved in the Figure 1 shows the interaction between the entities involved in the
call, as to how location is referenced and subsequently de- call, as to how location is referenced and subsequently de-
referenced. The figure proposes that location reference is conveyed referenced. The figure proposes that location reference is conveyed
from the endpoint-to-endpoint via each middlebox (SIP Proxy), and from the endpoint-to-endpoint via each middlebox (SIP Proxy), and
undergoes a de-referencing operation at each step. The figure also undergoes a de-referencing operation at each step. The figure also
depicts a LMS (Location-to-Mapping Server) element which is used to depicts a LMS (Location-to-Mapping Server) element which is used to
determine the next target destination, based on the de-referenced determine the next target destination, based on the de-referenced
location. location.
At the PSAP, the end device also receives a location reference, (as At the PSAP, the end device also receives a location reference, (as
skipping to change at page 9, line 10 skipping to change at page 12, line 10
4. The PSAP, consistent with the figure, may choose to de-reference 4. The PSAP, consistent with the figure, may choose to de-reference
the location identifier, once it is received, in order to view the location identifier, once it is received, in order to view
the location, and to request subsequent location-based actions. the location, and to request subsequent location-based actions.
5. High-Level Requirements 5. High-Level Requirements
Below, we summarize high-level design requirements needed for a Below, we summarize high-level design requirements needed for a
location-by-reference mechanism. location-by-reference mechanism.
Rq1. Location Conveyance By Value (LbyV): The conveyance protocol Rq1. Location Reference Identifier as a URI: The dereferencing
MUST support the conveyance of location information in its fully- protocol MUST support an LRI in URI form, and may support other
contained form, i.e., a PIDF-LO. (I know this isn't a requirement non-URI forms.
for LbyR, but is included for balance.)
Rq2. Location Conveyance By Reference (LbyR): The conveyance
protocol MAY support the conveyance of a location information
reference identifier, in the form of 'any URI', which can be used
to de-reference the location into its fully-contained form, (e.g.,
a PIDF-LO).
Rq3. Location Conveyance Duality: The location conveyance protocol Rq2. Dereference Protocol Confidentiality: The dereferencing
MAY support both location value and location reference identifier protocol MUST support mechanisms for encrypting messages sent
in the same message. between client (Location recipient) and server (Location server).
Rq4. Private Location Reference Id.: The dereferencing protocol Rq3. Dereference Protocol Transparancy: The dereferencing protocol
MUST support the encryption of a location reference identifier. MUST support the exchange of messages without encryption (i.e., in
plaintext).
Rq5. Public Location Reference Id.: The dereferencing protocol MAY Motivation: In the case where encrypted message exchange is
convey a location reference identifier in plaintext. unsuccessful, there must be a way to try to dereference a location
reference identifier with less restriction (e..g., in the
emergency service case, where every call always needs answered).
Rq6. Location Reference Expiry: There MUST exist, a location Rq4. Location Reference Expiry: The dereference protocol MUST
reference uri format that includes a specified, finite period of support specification of a finite period of validity for the LRI.
validity.
Motivation: Location references are not intended to represent a Motivation: Location references are not intended to represent a
location forever, and the identifier eventually may need to be location forever, and the identifier eventually may need to be
recycled, or may be subject to a specific window of validity, recycled, or may be subject to a specific window of validity,
after which the location reference fails to yield a location, or after which the location reference fails to yield a location, or
the location is determined to be kept confidential. An expiry the location is determined to be kept confidential. An expiry
timer for a location reference ensures that the location reference timer for a location reference ensures that the location reference
becomes invalid based on configuration. becomes invalid based on configuration.
Rq7. de-reference Protocol Transport: The de-reference protocol MUST Rq5. Dereference Protocol Transport: The de-reference protocol MUST
support TCP/IP and MAY support UDP/IP. support TCP/IP and MAY support UDP/IP.
Rq8. LRI Distribution: The location reference standard MUST allow Motivation: Practical, near-term deployment issues may make TCP/IP
construction of location references that can be distributed to and implementations unachievable.
de-referenced by multiple parties, and MAY support references that
are restricted to a single de-referencer"
Rq9''. de-reference Protocol Authentication: The dereferencing Rq6''. Dereference Protocol Authentication: The dereferencing
protocol MUST support both client-side and server-side protocol MUST support both client-side and server-side
authentication. authentication.
Motivation: It is reasonable to expect implementations of Motivation: It is reasonable to expect implementations of
authentication to vary. Some implementations may choose to authentication to vary. Some implementations may choose to
support both client-side and server-side authentication, might support both client-side and server-side authentication, might
support one only, or may support neither. support one only, or may support neither.
Rq10. Location Privacy: The de-reference protocol MUST support the Rq7. Location Privacy: The dereference protocol MUST support the
application of privacy rules to the dissemination of a requested application of privacy rules to the dissemination of a requested
location object. The entity that receives requests through the location object.
de-reference protocol MUST obey all privacy rules that apply to a
requested location object.
Rq11. De-referenced PIDF-LO Result: The dereferencing of an LRI Rq8. Dereferenced PIDF-LO Result: The dereferencing of an LRI MUST
MUST result in a well-formed PIDF-LO. result in a well-formed PIDF-LO.
Motivation: This is in order to ensure adequate privacy rules can Motivation: This is in order to ensure adequate privacy rules can
be adhered to, since the PIDF-LO format comprises the necessary be adhered to, since the PIDF-LO format comprises the necessary
structures to maintain location privacy. structures to maintain location privacy.
Rq12. Expiry of de-referenced Location: The de-referenced location,
in PIDF-LO format, MUST include a configurable expiry timer to
signal the point after which the PIDF-LO contained location is no
longer considered usable.
Motivation: Once the location is de-referenced, it would be
difficult to keep it from being passed around further 'as a plain
old PIDF-LO', hence a timer expiry is specified. (This technique
does not prevent would-be 'black-hats' from reusing the PIDF-LO,
but provides some additional functionality within a proper use
context.
Rq13. De-reference Protocol Selection: Location by reference
systems MUST support at least one, and MAY support multiple
dereferencing protocols.
6. Security Considerations 6. Security Considerations
Threats and security requirements are discussed in a separate Considerations for security to a Location-by-Reference model for the
document document [11]. dereference protocol, include, 1. Privacy Privacy of the LRI itself
Privacy of the dereferenced location object 2. Expiry Expiry of the
LRI. Expiry of the dereferenced location object. 3. Theft Theft of
a LRI. Theft of a dereferenced location object. 4. Replay/Reuse
Replay of a stolen LRI to perform a dereference operation. Reuse
using the dereference location object. 5. Impact of the two forms of
location reference. Location provision from LIS by reference.
Location indirection by the LIS, at the request of the Target. May
also reference security considerations found within document
[I-D.ietf-geopriv-l7-lcp-ps].
7. IANA Considerations 7. IANA Considerations
This document does not require actions by the IANA. This document does not require actions by the IANA.
8. Contributors 8. Contributors
[TBD] Andrew Newton, James Polk, Martin Thompson, Richard Barnes, Barbara
Stark, James Winterbottom, Hannes Tschofenig
The contributors can be reached at: The contributors can be reached at:
Name user@example.com Name user@example.com
9. Acknowledgments 9. Acknowledgments
[TBD] [TBD]
10. References 10. References
10.1. Normative References 10.1. Normative References
[1] Bradner, S., "Key words for use in RFCs to Indicate Requirement [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Levels", BCP 14, RFC 2119, March 1997. Requirement Levels", BCP 14, RFC 2119, March 1997.
10.2. Informative References 10.2. Informative References
[2] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., [I-D.hardie-ecrit-lost]
Peterson, J., Sparks, R., Handley, M., and E. Schooler, "SIP: Hardie, T., "LoST: A Location-to-Service Translation
Session Initiation Protocol", RFC 3261, June 2002. Protocol", draft-hardie-ecrit-lost-00 (work in progress),
March 2006.
[3] Charlton, N., Gasson, M., Gybels, G., Spanner, M., and A. van [I-D.ietf-ecrit-requirements]
Wijk, "User Requirements for the Session Initiation Protocol Schulzrinne, H. and R. Marshall, "Requirements for
(SIP) in Support of Deaf, Hard of Hearing and Speech-impaired Emergency Context Resolution with Internet Technologies",
Individuals", RFC 3351, August 2002. draft-ietf-ecrit-requirements-12 (work in progress),
August 2006.
[4] Cuellar, J., Morris, J., Mulligan, D., Peterson, J., and J. [I-D.ietf-ecrit-security-threats]
Polk, "Geopriv Requirements", RFC 3693, February 2004. Taylor, T., "Security Threats and Requirements for
Emergency Call Marking and Mapping",
draft-ietf-ecrit-security-threats-03 (work in progress),
July 2006.
[5] Polk, J., Schnizlein, J., and M. Linsner, "Dynamic Host [I-D.ietf-geopriv-dhcp-civil]
Configuration Protocol Option for Coordinate-based Location Schulzrinne, H., "Dynamic Host Configuration Protocol
Configuration Information", RFC 3825, July 2004. (DHCPv4 and DHCPv6) Option for Civic Addresses
Configuration Information",
draft-ietf-geopriv-dhcp-civil-09 (work in progress),
January 2006.
[6] Peterson, J., "Common Profile for Instant Messaging (CPIM)", [I-D.ietf-geopriv-l7-lcp-ps]
RFC 3860, August 2004. Tschofenig, H. and H. Schulzrinne, "GEOPRIV Layer 7
Location Configuration Protocol; Problem Statement and
Requirements", draft-ietf-geopriv-l7-lcp-ps-00 (work in
progress), January 2007.
[7] Schulzrinne, H., "The tel URI for Telephone Numbers", RFC 3966, [I-D.ietf-sipping-toip]
December 2004. Wijk, A. and G. Gybels, "Framework for real-time text over
IP using the Session Initiation Protocol (SIP)",
draft-ietf-sipping-toip-07 (work in progress),
August 2006.
[8] Hellstrom, G. and P. Jones, "RTP Payload for Text [RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston,
Conversation", RFC 4103, June 2005. A., Peterson, J., Sparks, R., Handley, M., and E.
Schooler, "SIP: Session Initiation Protocol", RFC 3261,
June 2002.
[9] Peterson, J., "A Presence-based GEOPRIV Location Object [RFC3351] Charlton, N., Gasson, M., Gybels, G., Spanner, M., and A.
Format", RFC 4119, December 2005. van Wijk, "User Requirements for the Session Initiation
Protocol (SIP) in Support of Deaf, Hard of Hearing and
Speech-impaired Individuals", RFC 3351, August 2002.
[10] Schulzrinne, H. and J. Polk, "Communications Resource Priority [RFC3693] Cuellar, J., Morris, J., Mulligan, D., Peterson, J., and
for the Session Initiation Protocol (SIP)", RFC 4412, J. Polk, "Geopriv Requirements", RFC 3693, February 2004.
February 2006.
[11] Taylor, T., "Security Threats and Requirements for Emergency [RFC3825] Polk, J., Schnizlein, J., and M. Linsner, "Dynamic Host
Call Marking and Mapping", draft-ietf-ecrit-security-threats-03 Configuration Protocol Option for Coordinate-based
(work in progress), July 2006. Location Configuration Information", RFC 3825, July 2004.
[12] Schulzrinne, H. and R. Marshall, "Requirements for Emergency [RFC3860] Peterson, J., "Common Profile for Instant Messaging
Context Resolution with Internet Technologies", (CPIM)", RFC 3860, August 2004.
draft-ietf-ecrit-requirements-12 (work in progress),
August 2006.
[13] Hardie, T., "LoST: A Location-to-Service Translation Protocol", [RFC3966] Schulzrinne, H., "The tel URI for Telephone Numbers",
draft-hardie-ecrit-lost-00 (work in progress), March 2006. RFC 3966, December 2004.
[14] Schulzrinne, H., "Dynamic Host Configuration Protocol (DHCPv4 [RFC4103] Hellstrom, G. and P. Jones, "RTP Payload for Text
and DHCPv6) Option for Civic Addresses Configuration Conversation", RFC 4103, June 2005.
Information", draft-ietf-geopriv-dhcp-civil-09 (work in
progress), January 2006.
[15] Wijk, A. and G. Gybels, "Framework for real-time text over IP [RFC4119] Peterson, J., "A Presence-based GEOPRIV Location Object
using the Session Initiation Protocol (SIP)", Format", RFC 4119, December 2005.
draft-ietf-sipping-toip-07 (work in progress), August 2006.
[RFC4412] Schulzrinne, H. and J. Polk, "Communications Resource
Priority for the Session Initiation Protocol (SIP)",
RFC 4412, February 2006.
Author's Address Author's Address
Roger Marshall (editor) Roger Marshall (editor)
TeleCommunication Systems, Inc. TeleCommunication Systems, Inc.
2401 Elliott Avenue 2401 Elliott Avenue
2nd Floor 2nd Floor
Seattle, WA 98121 Seattle, WA 98121
US US
 End of changes. 50 change blocks. 
163 lines changed or deleted 303 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/