<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-gundavelli-radepcs-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="RADIUS EPCS">RADIUS attributes for National Security and Emergency Preparedness Service</title>

    <author initials="S." surname="Gundavelli" fullname="Sri Gundavelli">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>170 West Tasman Drive</street>
          <city>San Jose</city>
          <code>95134</code>
          <country>US</country>
        </postal>
        <email>sgundave@cisco.com</email>
      </address>
    </author>
    <author initials="S." surname="Das" fullname="Subir Das">
      <organization>Peraton Labs</organization>
      <address>
        <postal>
          <street>150 Mount Airy Road</street>
          <city>Basking Ridge</city>
          <code>07920</code>
          <country>US</country>
        </postal>
        <email>sdas@peratonlabs.com</email>
      </address>
    </author>
    <author initials="M." surname="Grayson" fullname="Mark Grayson">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>10 New Square Park</street>
          <city>Feltham</city>
          <code>TW14 8HA</code>
          <country>UK</country>
        </postal>
        <email>mgrayson@cisco.com</email>
      </address>
    </author>
    <author initials="M." surname="Dolly" fullname="Martin C Dolly">
      <organization>AT&amp;T</organization>
      <address>
        <postal>
          <street>200 Laurel Avenue</street>
          <city>Middletown</city>
          <code>07748</code>
          <country>US</country>
        </postal>
        <email>Md3135@att.com</email>
      </address>
    </author>
    <author initials="A." surname="Nguyen" fullname="An Nguyen">
      <organization>US DHS/CISA</organization>
      <address>
        <postal>
          <street>245 Murray Lane SW, MS0123</street>
          <city>Washington, DC</city>
          <code>20528-0123</code>
          <country>US</country>
        </postal>
        <email>an.p.nguyen@cisa.dhs.gov</email>
      </address>
    </author>

    <date year="2025" month="January" day="15"/>

    <area>general</area>
    <workgroup>RADEXT Working Group</workgroup>
    <keyword>Internet-Draft</keyword> <keyword>RADIUS</keyword> <keyword>EPCS</keyword> <keyword>Emergency</keyword> <keyword>Priority</keyword>

    <abstract>


<?line 131?>

<t>This document describes RADIUS attributes for supporting
authorization of Emergency Preparedness Communication
Service (EPCS), enabling authorized users to benefit from
preferential access to Wi-Fi network resources during
congestion.</t>



    </abstract>



  </front>

  <middle>


<?line 139?>

<section anchor="intro"><name>Introduction</name>

<t>Priority Services (PS) communications in support of National Security/Emergency Preparedness (NS/EP) services are operational in various countries around the world. While these have traditionally only been supported over cellular networks <xref target="TS.22153"/>, the recent addition of Emergency Preparedness Communications Service (EPCS) functionality into Wi-Fi 7 <xref target="IEEE80211BE"/> means that Wi-Fi now supports preferred or prioritized channel access (PCA) to authorized users
that can be used for Multimedia Priority Services (MPS) communications over public/private Wi-Fi networks
in emergency service (ES) scenarios.</t>

<t>Whereas Wi-Fi 7 defines the interactions between the Wi-Fi Access Point (AP) and the Wi-Fi Station (STA) device for prioritized channel access, it does not provide an end-to-end architecture for enabling EPCS authorization capability on a per device basis.</t>

<t>CISRCVIII WG4 recommendations for FCC provide opportunities for regulatory bodies, like the FCC, to assess and promote Wi-Fi's role in emergency services <xref target="CSRC8-WG4"/>.</t>

<t>Earlier deliverables from CISRCV WG8 have provided recommendations for the role of the network within the priority services platform and to enforce priority levels on traffic associated with priority users <xref target="CSRC5-WG8"/>. There are number of factors critical to this enforcement function:</t>

<t><list style="symbols">
  <t>The priority user must be authenticated and authorized to receive priority treatment.</t>
  <t>The network must be able to uniquely identify priority user traffic and associate the authorized level of priority to that traffic.</t>
  <t>The network must then have prioritization means to apply to the identified traffic.</t>
  <t>For cases where networks interconnect, traffic prioritization indicators must be securely passed to interconnected networks for downstream prioritization.</t>
</list></t>

<t>This document specifies an extension to the Remote Authentication
Dial-In User Service (RADIUS) protocol <xref target="RFC2865"/> that enables
a Wi-Fi Network Access Server (NAS) to indicate to a RADIUS server that it is EPCS capable, as well as enabling
a RADIUS server to indicate to a NAS that an authenticated user
is authorized to receive the EPCS service.</t>

<section anchor="Requirements"><name>Requirements Language</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
"SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT
RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="Terminology"><name>Terminology</name>

<t>Authorizing Entity:</t>

<t>Refers to the Authority (e.g., Government entity) responsible for vetting and assigning priority privileges and user priority levels to an individual or organization.</t>

<t>Priority Services:</t>

<t>A feature designed to enable NS (National Security) or EP (Emergency Preparedness) subscribers to make priority calls or data session on a Service Providers network, particularly at times of congestion.</t>

<t>Service user:</t>

<t>Means an individual or organization to whom or which a priority access assignment
  has been made.</t>

<t>Wireless service provider:</t>

<t>Refers to a provider of a wireless communications
  service or Internet Protocol-based service, including commercial or private mobile service. The
  term includes agents of the licensed provider and resellers of wireless service.</t>

</section>
</section>
<section anchor="Provisioning"><name>Overview of EPCS Provisioning</name>

<t>This section first provides background on how MPS service is currently provisioned and authorized.
The section then describes how that can be adapted for EPCS to support Wi-Fi use cases.</t>

<t>The service user
engages with an authorizing entity to request the provision of Multimedia Priority Service
for a device that has a subscription with a service provider.
The service provider, such as a cellular
operator, will receive an indication from the authorizing entity, by an out of band mechanism, that a
subscriber has been authorized for priority services and will store such
an indication as part of the subscription profile of the subscriber
(e.g., in the Home Subscriber Server (HSS)).</t>

<t><xref target="figprovisioning"/> illustrates the scenario where the service provider is a cellular operator that is also operating as a Wi-Fi Identity Provider. In such cases,
the operator can mirror the authorization information in their Wi-Fi Authentication,
Authorization and Accounting (AAA) system.</t>

<figure title="Provisioning Priority Services over Wi-Fi Networks" anchor="figprovisioning"><artwork><![CDATA[
+---------+    +------------+    +--------------+    +-----------+
|  Wi-Fi  |    |EPCS Enabled|    |   Wireless   |    | Priority  |
|Priority |    |Wi-Fi Access|    |Operator/Wi-Fi|    |  Service  |
| Service |    |  Network   |    |   Identity   |    |Authorizing|
|  User   |    |            |    |   Provider   |    |  Entity   |
+---------+    +------------+    +--------------+    +-----------+
     |               |                   |                 |
     |1. Standard service user authorization for priority  |
     |   Service (unchanged)             |                 |
     |<===================================================>|
     |               |                   |                 |
     |               |                   |2. Receive Priority
     |               |                   |   Authorization |
     |               | 3. Mirror HSS     |   (unchanged)   |
     |               |    Authorization  |<===============>|
     |               |    in Wi-Fi AAA   |                 |
     |               |         //========|                 |
     |               |         ||        |                 |
     |               |         \\=======>|                 |
     |               |                   |                 |
     |               |                   |                 |

]]></artwork></figure>

</section>
<section anchor="Authorization"><name>EPCS Authorization RADIUS Exchange</name>

<t>The top level RADIUS Authorization flow for an EPCS Service User is
illustrated in <xref target="figauthorization"/>.</t>

<t><list style="numbers" type="1">
  <t>In step 1, the EPCS enabled Wi-Fi Access Network provider configures the EPCS Roaming Consortium on its Wi-Fi access network.</t>
  <t>In step 2, the Wi-Fi Priority Service User enables an EPCS Passpoint profile on their device. This enables normal Passpoint automatic network selection.</t>
  <t>In step 3, the Wi-Fi Priority Service User's device matches the EPCS Roaming Consortium in the Wi-Fi beacon, probe response or Access Network Query Protocol (ANQP) response with its Passpoint profile.</t>
  <t>In steps 4 and 5, the Wi-Fi device triggers an association with the Wi-Fi Access Point/Wireless LAN Controller (AP/WLC). The device includes the EPCS Passpoint Roaming Consortium Organizational Indicator (RCOI) in the  Roaming Consortium Selection element <xref target="PASSPOINT"/> and receives an association response.</t>
  <t>In steps 6 and 7, the AP/WLC performs the Extensible Authentication Protocol exchange over the LAN using EAPOL frames exchanged with the device, requesting the devices EAP identity and receives the corresponding identity associated with the EPCS Passpoint profile in the EAP response.</t>
  <t>In step 8, the AP/WLC extracts the EAP identity and includes this in a RADIUS Access-Request that is sent to the Identity Provider. In this example, the identity realm corresponds to a Cellular operator as defined in <xref target="TS.23003"/>, e.g., wlan.mnc100.mcc313.3gppnetwork.org. The AP/WLC adds the Civic-Location attribute <xref target="RFC5580"/> to the RADIUS Access-Request, indicating the country code of the regulatory regime in which it is operating, the HS2.0-Roaming-Consortium attribute <xref target="PASSPOINT"/> indicating the EPCS Passpoint RCOI signaled by the device in step 4, and the EPCS-Capable-Indication attribute, as specified in <xref target="EPCSCI"/>. If the Wi-Fi AP/WLC is expecting to receive payment for handling the priority service traffic, the AP/WLC can include additional attributes related to charging, for example the offered WBA-Linear-Volume-Rate <xref target="WBAVSAS"/>.</t>
  <t>In step 9. the EAP dialogue completes between the supplicant in the Wi-Fi device and the Cellular Operator's EAP server.</t>
  <t>In step 10, the authenticated device is matched against the priority subscription profile. The provider MAY use the country code signalled in step 6 and compare that with the regulatory regimes in which priority service is authorized.</t>
  <t>In step 11, assuming the user is authorized, the cellular operator replies with a RADIUS Access-Accept including the EAP-SUCCESS message and the EPCS-Subscription-Info attribute defined in <xref target="EPCSSI"/>.</t>
  <t>In step 12, the AP/WLC recovers the keying material from the Access-Accept packet and forwards the EAP-SUCCESS message to the device.</t>
  <t>In step 13 and 14, the AP/WLC enables EPCS priority access by sending the EPCS Priority Access Enable Request frame to the device. The device (i.e., STA) responds with an EPCS Priority Access Enable Response frame in step 14. (Note: These steps assume the AP/WLC is configured or triggered to automatically enable EPCS for the device.)</t>
  <t>In step 15, the device receives EPCS Priority Access.</t>
</list></t>

<figure title="Authorizing Priority Services over Wi-fi" anchor="figauthorization"><artwork><![CDATA[
+---------+    +------------+    +--------------+
|  Wi-Fi  |    |EPCS Enabled|    |   Wireless   |
|Priority |    |Wi-Fi Access|    |Operator/Wi-Fi|
| Service |    |  Network   |    |   Identity   |
| Device  |    |            |    |   Provider   |
+---------+    +------------+    +--------------+
     |               |                   |       
     |               |1. Configure EPCS Roaming Consortium
     |               |==========\        |
     |               |          ||       |
     |2. User enables|<=========/        |
     |   EPCS Passpoint                  |
     |   profile     |                   |
     |======\        |                   |
     |      ||       |                   |
     |<=====/        |                   |
     |3. Beacon received with            |
     |   Roaming Consortium              |
     |   EPCS Priority Access Support    |
     |<==============|                   |
     |4. Association |                   |
     |   Request     |                   |
     |  (Roaming Consortium Selection Element)
     |==============>|                   |
     |5. Association |                   |
     |   Response    |                   |
     |<==============|                   |
     |6. EAP-Identity/                   |
     |   Request     |                   |
     |<==============|                   |
     |7. EAP-Identity/                   |
     |   Response    |                   |
     |==============>|8. RADIUS Access-Request
     |               |   EAP Response Identity
     |               |   Civic-Location (Country Code)
     |               |   EPCS-Capable-Indication
     |               |   HS2.0-Roaming-Consortium
     |               |   (opt) WBA-Linear-Volume-Rate
     |               |==================>|
     |               |                   |
     |       9. EAP Dialogue             |
     |<=================================>|10. Match user with
     |               |                   |   priority
     |               |                   |   subscription
     |               |                   |   authorization
     |               |                   |======\
     |               |                   |      ||
     |               |                   |<=====/
     |               |11. RADIUS Access-Accept
     |               |    EAP-Success    |
     |               |    EPCS-Regulatory-Info
     |               |    EPCS-Subscription-Info
     |               |<==================|
     |12. EAP-SUCCESS|                   |
     |<==============|                   |
     |               |                   |
     |13. EPCS Priority Access Enable Request
     |<==============|                   |
     |               |                   |
     |14. EPCS Priority Access Enable Response
     |==============>|                   |
     |               |                   |
 +------------------------+              |
 |15. EPCS Priority Access|              |
 +------------------------+              |
     |               |                   |
]]></artwork></figure>

</section>
<section anchor="attributes"><name>RADIUS EPCS Attributes</name>

<t>The current RADIUS protocol does not have the support for the flow described in the previous section and therefore, the following attributes are required to enable it.</t>

<section anchor="EPCSCI"><name>EPCS-Capable-Indication</name>

<t>Description</t>

<t>The EPCS-Capable-Indication (TBA1) Attribute allows a RADIUS
NAS to indicate to a RADIUS server that it is EPCS capable.</t>

<t>One EPCS-Capable-Indication Attribute MAY be included in
an Access-Request packet.</t>

<t>A summary of the EPCS-Capable-Indication Attribute format is
shown in <xref target="attr-epcs-cap"/>. The fields are transmitted from left to right.</t>

<figure title="Encoding EPCS-Capable-Indication Attribute" anchor="attr-epcs-cap"><artwork><![CDATA[
0                   1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |  Length       |           Value               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

]]></artwork></figure>

<t>Type</t>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>TBA1</t>
  </li></ul>
</li></ul>

<t>Length</t>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>6 octet</t>
  </li></ul>
</li></ul>

<t>Data Type</t>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>Integer</t>
  </li></ul>
</li></ul>

<t>Value</t>

<ul empty="true"><li>
  <t>The field is 2 octets, containing a 16-bit unsigned integer that
represents whether the NAS and the device support the EPCS capability
and what capabilities the NAS has to handle the traffic to the authorized EPCS users.
This document defines two such values used with the EPCS-Capable-Indication attribute:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>0     EPCS Priority Access is supported by the NAS. Irrespective of the EPCS support by the device, the NAS can prioritize downlink traffic to authorized
EPCS users <xref target="FCC"/>.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>1     EPCS Priority Access is supported by the NAS and the device. The NAS can prioritize uplink and downlink traffic for EPCS priority access to authorized
EPCS users.</t>
    </li></ul>
  </li></ul>
</li></ul>

<t>Note: How the NAS treats the traffic is vendor specific implementation and is outside the scope of this document.</t>

</section>
<section anchor="EPCSRI"><name>EPCS-Regulatory-Info</name>

<t>Description</t>

<t>The EPCS-Regulatory-Info (TBA2) Attribute allows a RADIUS
Server that is authorizing a user to receive priority channel
access to indicate the regulatory regime under which the
RADIUS Server operates.</t>

<t>One EPCS-Regulatory-Info Attribute MAY be included in
an Access-Accept packet.</t>

<t>A summary of the EPCS-Regulatory-Info Attribute format is
shown in <xref target="attr-epcs-reg"/>. The fields are transmitted from left to right.</t>

<figure title="Encoding EPCS-Regulatory-Info Attribute" anchor="attr-epcs-reg"><artwork><![CDATA[
0                   1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |  Length       |        Country-Code           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

]]></artwork></figure>

<t>Type</t>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>TBA2</t>
  </li></ul>
</li></ul>

<t>Length</t>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>6 octet</t>
  </li></ul>
</li></ul>

<t>Data Type</t>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>Country-Code</t>
  </li></ul>
</li></ul>

<t>Value</t>

<ul empty="true"><li>
  <t>The field is 2 octets, containing the two-letter ISO 3166 country code in capital ASCII
letters, e.g., DE or US.</t>
</li></ul>

</section>
<section anchor="EPCSSI"><name>EPCS-Subscription-Info</name>

<t>Description</t>

<t>The EPCS-Subscription-Info (TBA3) Attribute allows a RADIUS
Server to indicate to a NAS that a user is authorized
to receive priority service.</t>

<t>One EPCS-Subscription-Info Attribute MAY be included in
an Access-Accept packet and its presence indicates the
authenticated user is authorized to receive priority service accordingly to the priority level associated with the user's subscription. .</t>

<t>A summary of the EPCS-Subscription-Info Attribute format is
shown in <xref target="attr-epcs-sub"/>. The fields are transmitted from left to right.</t>

<figure title="Encoding EPCS-Subscription-Info Attribute" anchor="attr-epcs-sub"><artwork><![CDATA[
0                   1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |  Length       |        Priority-level         |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

]]></artwork></figure>

<t>Type</t>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>TBA3</t>
  </li></ul>
</li></ul>

<t>Length</t>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>6 octet</t>
  </li></ul>
</li></ul>

<t>Data Type</t>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>Integer</t>
  </li></ul>
</li></ul>

<t>Value</t>

<ul empty="true"><li>
  <t>The field is 2 octets, containing a 16-bit unsigned integer that
represents whether the priority level associated with the user's
subscription. The priority levels can be determined by the entity
that provides the authorization information and/or based on service provider's policies.</t>
</li></ul>

</section>
</section>
<section anchor="Security"><name>Security Considerations</name>

<t>To be completed.</t>

</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>To be completed.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC2865">
  <front>
    <title>Remote Authentication Dial In User Service (RADIUS)</title>
    <author fullname="C. Rigney" initials="C." surname="Rigney"/>
    <author fullname="S. Willens" initials="S." surname="Willens"/>
    <author fullname="A. Rubens" initials="A." surname="Rubens"/>
    <author fullname="W. Simpson" initials="W." surname="Simpson"/>
    <date month="June" year="2000"/>
    <abstract>
      <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2865"/>
  <seriesInfo name="DOI" value="10.17487/RFC2865"/>
</reference>
<reference anchor="RFC5580">
  <front>
    <title>Carrying Location Objects in RADIUS and Diameter</title>
    <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
    <author fullname="F. Adrangi" initials="F." surname="Adrangi"/>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="A. Lior" initials="A." surname="Lior"/>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <date month="August" year="2009"/>
    <abstract>
      <t>This document describes procedures for conveying access-network ownership and location information based on civic and geospatial location formats in Remote Authentication Dial-In User Service (RADIUS) and Diameter.</t>
      <t>The distribution of location information is a privacy-sensitive task. Dealing with mechanisms to preserve the user's privacy is important and is addressed in this document. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5580"/>
  <seriesInfo name="DOI" value="10.17487/RFC5580"/>
</reference>

<reference anchor="CSRC8-WG4" target="https://www.fcc.gov/sites/default/files/CSRIC8-Report-911overWi-Fi032123.pdf">
  <front>
    <title>REPORT ON 911 SERVICE OVER WI-FI</title>
    <author initials="" surname="COMMUNICATIONS SECURITY, RELIABILITY, AND INTEROPERABILITY COUNCIL VIII WG4">
      <organization></organization>
    </author>
    <date year="2023" month="March"/>
  </front>
</reference>
<reference anchor="CSRC5-WG8" target="https://www.fcc.gov/sites/default/files/CSRIC5-WG8-FinalReport031517.pdf">
  <front>
    <title>PRIORITY SERVICES</title>
    <author initials="C. S. R. A. I. C. V." surname="WG8">
      <organization></organization>
    </author>
    <date year="2017" month="March"/>
  </front>
</reference>
<reference anchor="FCC" target="https://docs.fcc.gov/public/attachments/FCC-22-36A1_Rcd.pdf">
  <front>
    <title>Review of Rules and Requirements For Priority Services</title>
    <author initials="" surname="Federal Communications Commission">
      <organization></organization>
    </author>
    <date year="2022" month="May"/>
  </front>
</reference>
<reference anchor="PASSPOINT" target="https://www.wi-fi.org/file/passpoint-specification-package">
  <front>
    <title>Passpoint Specification, v3.3.7</title>
    <author initials="" surname="Wi-Fi Alliance">
      <organization></organization>
    </author>
    <date year="2024" month="February"/>
  </front>
</reference>
<reference anchor="TS.23003" >
  <front>
    <title>Numbering, addressing and identification</title>
    <author initials="" surname="3GPP">
      <organization></organization>
    </author>
    <date year="2024" month="September"/>
  </front>
  <seriesInfo name="3GPP TS 23.003 19.0.0" value=""/>
</reference>
<reference anchor="TS.22153" >
  <front>
    <title>Multimedia priority service</title>
    <author initials="" surname="3GPP">
      <organization></organization>
    </author>
    <date year="2025" month="January"/>
  </front>
  <seriesInfo name="3GPP TS 22.153 20.0.0" value=""/>
</reference>
<reference anchor="WBAVSAS" target="https://github.com/wireless-broadband-alliance/RADIUS-VSA">
  <front>
    <title>Wireless Broadband Alliance Defined Vendor Specific Attributes</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="2023" month="May"/>
  </front>
</reference>
<reference anchor="IEEE80211BE" >
  <front>
    <title>Enhancements for Extremely High Throughput (EHT)</title>
    <author initials="" surname="IEEE">
      <organization></organization>
    </author>
    <date year="2024" month="October"/>
  </front>
  <seriesInfo name="IEEE 802.11be-2024 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment" value=""/>
</reference>


    </references>

</references>


<?line 489?>

<section numbered="false" anchor="Acknowledgements"><name>Acknowledgements</name>

<t>The authors would like to thank all the members of the Wireless Broadband Alliance's
Mission Critical &amp; Emergency Services (e911) project.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

