Fiona Lee, Manager, and Alastair Breeze, Software Engineer, Google – Emergency Location Service (ELS): New developments since EENA 2019
Salvatore Baglieri, Head of EMEA – Pixel Carrier Engineering, Google – ELS error rates & best practices
This presentation will give you a glance at NOKIA RNC solutions, RNC configuration,RNC cabinet mechanical structure,RNC architecture, RNC plug-in units (PIU)
,RNC function units (FUs), redundancy and PIUs configuration
This presentation will give you a glance at NOKIA RNC solutions, RNC configuration,RNC cabinet mechanical structure,RNC architecture, RNC plug-in units (PIU)
,RNC function units (FUs), redundancy and PIUs configuration
The Long Term Evolution (LTE) is the latest step in an advancing series of mobile telecommunications systems. In this paper, authors show interest on the security features and the cryptographic algorithms used to ensure confidentiality and integrity of the transmitted data. A closer look is taken upon EPS confidentiality and integrity algorithms. The authors also defined AKA, AS and NAS security and key derivations during normal Attach process and Handover also.
Topics covered in this presentation:
Abbreviations
Types of Cards
SIM Card Memory Architecture
RUM-Classifications
NV Vs RUIM
PRL
USIM
UICC Vs ICC
Abis Over IP/Abis Optimization on-site Workshopetkisizcom
Recognize new system architecture
Understand the dimensioning rules using the Abis planning tools
Activate the Abis over IP
Activate the Abis Optimization
Use the Performance Monitoring
This documents will help to understand the details procedure of GSM IDLE Mode Behavior. GSM Idle mode behavior starting from PLMN selection, GSM Cell Camp, Cell Selection, Cell Reselection, Location Update, Paging, System Information to Measurements procedures have been captured in this document.
Advanced: True Fixed-Mobile Convergence (FMC) with 5G3G4G
A presentation/video looking at how true fixed-mobile convergence will be achieved in 5G. The main motivation for this tutorial is the fact that 5G is designed to enable access-neutral service availability. What this means is that 5G services in future will be available seamlessly not just over 5G NR but also over Wi-Fi and Wireless access networks.
The tutorial discusses:
• Untrusted non-3GPP access networks;
• Trusted non-3GPP access networks (TNAN);
• Wireline access networks;
• Non-5G-Capable over WLAN (N5CW);
• Access Traffic Steering, Switching and Splitting (ATSSS)
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
LTE Basic Parameters, Data Rates, Duplexing & Accessing, Modulation, Coding & MIMO, Explanation of different nodes and Advantage & Disadvantages of different nodes.
Reducing RAN infrastructure resources by leveraging 5G RAN Transport Technolo...Michael Gronovius
This presentation describes the 5G transport requirements and discusses how to prepare today's mobile transport network for 5G in the most cost efficient way.
This basic presentation / video looks at SIM (Subscriber Identity Module) card, its evolution and what is the relation between SIM and UICC (Universal Integrated Circuit Card). It also explains different form factors like 2FF, 3FF, 4FF and MFF2 and UICC contents briefly.
Finally, we look at embedded SIM (eSIM), integrated SIM (iSIM), eUICC Profiles and profile switching via remote provisioning functions.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free TrainingVideos: https://www.3g4g.co.uk/Training/
Manage and protect you assets anywhere, family, house, vehicles. Tracking, Geo tagging, emergency support, fire and burglar protection, 24x7 dispatch & support, safety cloud service with telemedicine and vitals monitor
The Long Term Evolution (LTE) is the latest step in an advancing series of mobile telecommunications systems. In this paper, authors show interest on the security features and the cryptographic algorithms used to ensure confidentiality and integrity of the transmitted data. A closer look is taken upon EPS confidentiality and integrity algorithms. The authors also defined AKA, AS and NAS security and key derivations during normal Attach process and Handover also.
Topics covered in this presentation:
Abbreviations
Types of Cards
SIM Card Memory Architecture
RUM-Classifications
NV Vs RUIM
PRL
USIM
UICC Vs ICC
Abis Over IP/Abis Optimization on-site Workshopetkisizcom
Recognize new system architecture
Understand the dimensioning rules using the Abis planning tools
Activate the Abis over IP
Activate the Abis Optimization
Use the Performance Monitoring
This documents will help to understand the details procedure of GSM IDLE Mode Behavior. GSM Idle mode behavior starting from PLMN selection, GSM Cell Camp, Cell Selection, Cell Reselection, Location Update, Paging, System Information to Measurements procedures have been captured in this document.
Advanced: True Fixed-Mobile Convergence (FMC) with 5G3G4G
A presentation/video looking at how true fixed-mobile convergence will be achieved in 5G. The main motivation for this tutorial is the fact that 5G is designed to enable access-neutral service availability. What this means is that 5G services in future will be available seamlessly not just over 5G NR but also over Wi-Fi and Wireless access networks.
The tutorial discusses:
• Untrusted non-3GPP access networks;
• Trusted non-3GPP access networks (TNAN);
• Wireline access networks;
• Non-5G-Capable over WLAN (N5CW);
• Access Traffic Steering, Switching and Splitting (ATSSS)
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
LTE Basic Parameters, Data Rates, Duplexing & Accessing, Modulation, Coding & MIMO, Explanation of different nodes and Advantage & Disadvantages of different nodes.
Reducing RAN infrastructure resources by leveraging 5G RAN Transport Technolo...Michael Gronovius
This presentation describes the 5G transport requirements and discusses how to prepare today's mobile transport network for 5G in the most cost efficient way.
This basic presentation / video looks at SIM (Subscriber Identity Module) card, its evolution and what is the relation between SIM and UICC (Universal Integrated Circuit Card). It also explains different form factors like 2FF, 3FF, 4FF and MFF2 and UICC contents briefly.
Finally, we look at embedded SIM (eSIM), integrated SIM (iSIM), eUICC Profiles and profile switching via remote provisioning functions.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free TrainingVideos: https://www.3g4g.co.uk/Training/
Manage and protect you assets anywhere, family, house, vehicles. Tracking, Geo tagging, emergency support, fire and burglar protection, 24x7 dispatch & support, safety cloud service with telemedicine and vitals monitor
EGLA's Patent and Intellectual Property Portfolio - LicensingDr. Edwin Hernandez
EGLA represents a variety of patents and intellectual property for sale or license to any bidder. Our IP includes : RF Emulation/Simulation Platforms and Patents, Mobility Protocols for 4G, Cloud-based systems for multimedia streaming, Safety Apps/Cloud with patents (SafeFi) and a Hotel Management System.
Aplicacions de 5G al IoT i la Indústria 4.0: mMTC i URLLCTICAnoia
Una visió clara de com la incorporació del 5G afectarà i millorarà les aplicacions d' Internet de les Coses i com la reducció de latència, l'augment de velocitat, la millor eficiència energètica, la capacitat de connexió massiva de dispositius, etc. afectaran al desenvolupament de la industria 4.0
In 3 years, Advanced Mobile Location has brought considerable improvements to public safety. In this panel, experts will discuss the latest updates and the future improvements of the technology.
Chair: Christoph Kautz, Deputy Head, Unit Galileo and EGNOS – Applications, security, international cooperation, European Commission
In this session, companies will provide an overview of solutions and expertise that they can offer to emergency services in the framework of the deployment of public warning systems.
The opportunities presented by the roll-out of LTE are significant but are those challenges well known? In this session attendees heard from experts about how the emergency services will potentially benefit from LTE and how the rollout will impact on the emergency services.
Similar to EENA 2021 - Advanced Mobile Location (3/3) (20)
Markus Bornheim, International Practice Lead Public Safety & Emergency Services, Avaya – Automated drone services with real-time communication and collaboration experience
Kirk Arthur and Chad Wallace, Worldwide Public Safety & Justice, Microsoft Corporation – Improving Urban Safety through innovative technologies and new operational models
In this keynote session, a representative from the European Commission will present the European legislation affecting emergency communications and aspects of its implementation.
Gyula Bara, Policy Officer, European Commission
The high-level performance of frontline professionals is crucial but this becomes increasingly difficult during a long-term crisis with no replacements for personnel and no end in sight. It is essential to think and act differently, working strategically and actively with recovery. We will hear how a team turned a Swedish military concept and experiences from working in conflict zones into a civilian toolbox. The practical techniques were applied in Intensive Care Units managing the COVID-19 pandemic.
• Magdalena Robertsson Lind, Expert in crisis management and resilience, Co-founder of Metis Services
• Håkan Kalzén, Managing Director, Anaesthesia and Intensive Care Clinic Södertälje Hospital, Stockholm, Sweden
Search & Rescue and Missing Persons’ investigations often come to a standstill due to lack of information. How can technology change that? Robert Sell will explore the answer. We will hear how crowdsourced OSINT can be successfully used by emergency services and law enforcement, providing lifesaving information to fill the gaps and bring loved ones back to their families.
Robert Sell, OSINT expert and Founder, Trace Labs
In this session, NENA’s representatives will present how the security of 911 and NG911 services is now considered a priority in the United States. The speakers will explore the ecosystem of security agencies, as well as training and possible funding schemes that are in place or possible legislative efforts that would protect first responders’ agencies – the first point of contact for safety and security.
• Brian Fontes, CEO, NENA: The 9-1-1 Association, USA
• Brandon Abley, Director of Technology, NENA: The 9-1-1 Association, USA
Michael Kelly, Head of Operations, and Ciaran Moynihan, Systems Architect, Emergency Call Answering Service (ECAS), BT Ireland - Remote call-taking as a response to COVID-19
Pablo Gomez, Mass Notification Systems Strategic Marketing Director, Genasys – Multi-channel public warnings adding value in combination to evacuation management solutions
Michael Sargeant, Senior Manager, Public Warning, Everbridge, and Manuel Cornelisse, Chief Sales Officer, one2many, an Everbridge company – Everbridge & one2many – Pioneering Next Generation Public Warning
Amélie Grangeat, Head of Product Public Warning System, and Alessandro Lazari, Senior Key Account Manager, F24 - The F24 Multi-channel Public Warning System: Warn everyone, everywhere, anytime
Björn Skoglund, Operations Specialist on 112 and Crisis Management, SOS Alarm, Sweden – How non-emergency numbers can really help emergency services - The examples of 11313, 11414 and 1177 in Sweden
More from EENA (European Emergency Number Association) (20)
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
EENA 2021 - Advanced Mobile Location (3/3)
1. Confidential & Proprietary
Confidential & Proprietary
Android ELS
New Developments since EENA 2019
October 6, 2021
Email: android-emergency-location@google.com
Website: crisisresponse.google/els
2. Confidential & Proprietary
Agenda
2
• New ELS features/capabilities
• ELS Data SMS v2
• International roaming
• ELS error rates: troubleshooting & best practices
3. Confidential & Proprietary
Emergency
call initiated
by Android
device
Using FLP, ELS
computes location
on-device; data sent
directly to endpoint as
Data SMS AML or
HTTPS message
Endpoint is set up and managed by
ELS Partner, who is responsible for
making ELS data available to
Emergency Services (push or pull).
AML - Advanced Mobile Location,
open standard for sending
emergency location (supported by
Android ELS)
ELS Endpoint: a SMSC or HTTPS
server maintained by partner that
can receive ELS emergency location
data
ELS Partner: carrier/MNO,
government or public safety vendor
that meets ELS partner requirements
PSAP/ECC (Public Safety Answering
Point/Emergency Communications
Center): call center & dispatch
control for emergency services
Google’s Responsibility Partner’s Responsibility
ELS data flow primer
3
4. Confidential & Proprietary
ELS is operating at scale: live in 34 countries,
covering a population of 950 million people and
making over 600,000 emergency calls a day
Fully deployed Partially deployed
6. Confidential & Proprietary
Emergency Time 2021/09/28 2:21:20 PM
Emergency Number 999
IMEI 123456789001234
Location Time 2021/09/28 2:21:23 PM
Latitude 51.53333,
Longitude -0.12545
Accuracy 7.54
Altitude 36
Vertical Accuracy 2.5
Floor 10
Language en-GB
Car Crash Time 2021/09/28 2:21:16 PM
Altitude/Z-axis
6
ELS provides XYZ location coordinates
(Z-axis in meters above ellipsoid format)
7. Confidential & Proprietary
In an emergency,
location is the most
critical information
… but we’re also
making ELS more
helpful to emergency
responders by
sending additional
information
7
Device Language Car Crash Context
8. Confidential & Proprietary
Additional Data goal & principles
8
Goal: Send meaningful additional data that can help reduce
emergency response times.
• Privacy first
• Maintain the highest standards for data privacy and security, and give users
a clear and meaningful way to control it.
• The right content at the right time
• Send only contextual, relevant data when it can help save lives.
• Prioritize the most important content
• Never sacrifice critical content delivery or speed by including unnecessary
data.
9. Confidential & Proprietary
Language
9
In 2018, the San Francisco PSAP received
18,278 emergency calls requiring translation.
It can take several minutes to identify caller
language and get translators on the line.
Sometimes it can take 10 minutes or longer.
ELS provides an emergency caller’s device
language setting.
Call takers can use this to ask for a specific
translator right away - reducing translation
times by minutes.
SOLUTION
10. Confidential & Proprietary
Car Crash Detection
In the US, ~1.25m people die in crashes a
year and 20-50m more are injured or
disabled.
Call takers want to know as fast as
possible where and what the emergency
is in order to take action quickly.
ELS provides information that a Pixel*
user has been in a car crash.
Call takers can use this to get an early
and quick indication of the situation, and
start dispatching help.
SOLUTION
10
* Pixel 3 and later, available in English, Spanish & Japanese in the US,
UK, Ireland, Spain, Singapore, Australia, and Japan.
12. Confidential & Proprietary
ELS Data SMS 2.0 key takeaways
12
• Updates the original spec to include useful fields that provide
additional context/situational awareness.
• Google plans to continue to support ELS Data SMS v1.0
• Will conform with EENA’s proposed AML 2.0 specification to ETSI.
• … But will also include parameters that ETSI may or may not include in
AML 2.0, such as:
• Emergency number dialed/texted
• Default language setting in the device
• Piloting with 1 country, looking for more!
13. Confidential & Proprietary 13
Key Name Value Units Example
A”ML Version - 2
en New! Emergency Number - 911
et Timestamp of emergency call Epoch time in secs
(integer)
1593187189
lo Location (latitude, longitude, accuracy) - latitude and longitude must be
truncated to 5 decimal points, accuracy to 1 decimal point - an accuracy of
0 represents unknown
Degrees (float),
degrees (float), meters
(float)
37.42175,-
122.08461,20.1
lt Location time (relative to emergency time) - this field may be ignored if no
location (“lo”) field is present or no timestamp (“et”) field is present
Secs (integer) 5
lc Location Confidence* - may be ignored if no location (“lo”) field is present Percentage (integer) 68
lz New! Vertical Location (altitude, vertical accuracy); may be ignored if “lo” field is
present. All fields truncated to 1 decimal point (0 accuracy = unknown)
Meters (float), meters
(float)
-10.1,10.1
ls Location Source (wifi, cell, gps, fused, unknown) - this field may be ignored
if no location (“lo”) field is present
‘W’, ‘G’, ‘C’, ‘F’, ‘U’ W
ei IMEI - 355458061005220
nc Network MCC/MNC - 310260
hc Home MCC/MNC - 310260
lg New! Language Tags IETF BCP 47 en-US
15. Confidential & Proprietary
Visited Network
Home Network
Roaming option #1: Long Number
15
Visitor’s Device
Visited MSC
Home SMSC
PSAP
ELS Data SMS is routed to the home network SMSC and to the PSAP using a long number
ELS
SMS
+CC123456
+CC123456
16. Confidential & Proprietary
Visited Network
Roaming option #2: Orange Belgium
16
ELS Data SMS is redirected at the visited network to a dedicated roaming SMSC that
specialises in AML messages to be sent direct to the PSAP
Visitor’s Device
Visited MSC
PSAP
ELS
SMS
911
SMSC: +CC911
SMSC: +CC911
17. Confidential & Proprietary
Visited Network / Wi-Fi
Roaming option #3: HTTP
17
Internet
Roaming data-plan / Wi-Fi allows the ELS HTTP message to be sent direct to the PSAP
R
Visitor’s Device
PSAP
ELS
HTTP
https://…
18. Confidential & Proprietary
Comparing error rates: 2 Data SMS options vs HTTP
18
Data SMS Orange Belgium option
Data SMS Long Number option
Note: Orange
Belgium Data SMS
option would have
lower error rates if all
networks could
accept SIM-less
messages
HTTP
23. Confidential & Proprietary
Common root causes behind errors
23
1. Network/Hardware/Software Policies and/or Architecture
• Some MNOs, SMS infra vendors or device OEMs have configured their
systems/devices to hold all SMSes:
i. During an emergency call
ii. When device is emergency camped (roaming/in SOS mode)
* Issue specific to 1 MNO, may be an edge case
24. Confidential & Proprietary
Common root causes behind errors
24
1. Network/Hardware/Software Policies
• Some MNOs, SMS infra vendors or device OEMs have configured their
systems/devices to hold all SMSes:
i. During an emergency call
ii. When device is emergency camped (roaming/in SOS mode)
2. Circuit Switched Fallback (CSFB)
• When an LTE network is not available to make/receive a 112 call or SMS
message, the device “falls back” to a more accessible 3G/2G network to
finish the call or send the SMS message
* Issue specific to 1 MNO, may be an edge case
25. Confidential & Proprietary
Common root causes behind errors
25
1. Network/Hardware/Software Policies
• Some MNOs, SMS infra vendors or device OEMs have configured their
systems/devices to hold all SMSes:
i. During an emergency call
ii. When device is emergency camped (roaming/in SOS mode)
2. Circuit Switched Fallback (CSFB)
• When an LTE network is not available to make/receive a 112 call or SMS
message, the device “falls back” to a more accessible 3G/2G network to
finish the call or send the SMS message
3. SMS-over-IP on VoLTE devices
• Some LTE phones don’t support SMSoIP > unable to transmit ELS message(s)
28. Confidential & Proprietary 28
ELS call
ELS message
received
Compute
location
Y
N
Error
Y
N
Error
Send
location
29. Confidential & Proprietary
ELS Partner
Location
Database
ELS Endpoint
Mobile Network
Operator
Goog
le
29
SMS Center
in each
network
ECC/PSAP
ELS
Data
SMS
SMS Aggregation
Service
31. Confidential & Proprietary 31
Troubleshooting 101
What Dedicated debug session with MNO’s network elements engineer(s) , ELS Partner
and PSAP call taker(s)
32. Confidential & Proprietary 32
Troubleshooting 101
What Dedicated debug session with MNO’s network elements engineer(s) , ELS Partner
and PSAP call taker(s)
How Make 50-100 emergency calls using the ELS Manager app and a SIM from the MNO
33. Confidential & Proprietary 33
Troubleshooting 101
What Dedicated debug session with MNO’s network elements engineer(s) , ELS Partner
and PSAP call taker(s)
How Make 50-100 emergency calls using the ELS Manager app and a SIM from the MNO
Where Or in a lab or in live network but with all different infra vendors
34. Confidential & Proprietary 34
Troubleshooting 101
What Dedicated debug session with MNO’s network elements engineer(s) , ELS Partner
and PSAP call taker(s)
How Make 50-100 emergency calls using the ELS Manager app and a SIM from the MNO
Where Or in a lab or in live network but with all different infra vendors
Why Send & trace the progress of ELS test messages through the mobile network to see
if the messages are delivered successfully to/from the Endpoint.
If not, understand why and where in the process/network issues occur or the ELS
message fails.
36. Confidential & Proprietary
Detailed summary of roaming options
36
Long Number Orange Belgium* HTTP
HOW • Get a long number from an MNO that can
receive SMSes & is reachable from other
countries
• Request Google configure long # for int’l
routing
• ELS messages routing: Android Device →
Long # → Visitor’s Home SMSC → Visited
Country’s SMSC
• Set up a logical new SMSC with a specific
address that will be used to manage int’l
roaming ELS messages
• Request MNOs to use this specific address -
- with MCC and emergency #s of the visited
network
• Web server to handle ELS HTTP requests
PROS • Easy to set up • Better reliability, lower error rate
• No major investment required of MNOs
• Easily replicable, works for 2G/3G/4G/5G
• No out-of-country SMS fees for the visitor
• Easy to set up
• Richer ELS data (e.g. additional data)
• Low error rates (depending on
connectivity)
• Easily replicable, works for 2G/3G/4G/5G
CONS • Low reliability, high error rate
• Visitor could incur out-of-country SMS
fees
• Requires working closely with 1 MNO to set
up a new SMSC for int’l roaming
• MNOs must modify network + network rules
to successfully route ELS messages
• Require cellular data plan
• Can be less reliable (varies by country)
• Dynamic MSISDN issue
* EENA webinar on Orange Belgium approach @ https://eena.org/knowledge-hub/webinars/solution-aml-roaming/