Tn Database Daily Updates: Wireless Carrier Responsibilities - BellSouth E911 Owner's Manual

Bellsouth wireless router owner guide
Table of Contents

Advertisement

Wireless E911 Guide
TN Database Updates
basis as changes occur. Wireless Carriers will send daily updates to the E911 database via a mechanized
file transfer. Specifications for mechanized file transfer are described later in the tab. The file must include
pseudo-ANI TN records for the cell site locations or PSAPs in each E911 serving area. Only cell site or
PSAP information should be supplied, individual wireless subscriber data should not be provided unless
the service is provided to a fixed location. Pseudo-ANI numbers must be geographically valid for the
E911 selective routing tandem used to route calls to PSAPs. Prior to a new NXX being implemented,
the Wireless Carrier must furnish the NXX Table update form to the BST Wireless E911 Implementation
Manager. The form and instructions for its completion are included in this tab. The Wireless Carrier would
begin submitting TN database records, also known as Service Order Interface Records (SOIRs), after the
MSAG has been updated with cell site addresses and the NXXs have been added to the table.
The procedures for loading the pseudo-ANI TN records and the daily update process, including technical
specifications, are provided in this document. All pseudo-ANI TN records must match the E911 MSAG
database exactly before the record will be loaded to the TN database.
5.2

TN Database Daily Updates: Wireless Carrier Responsibilities

STEP
1
2
3
4
Page 24
ACTION
Obtain official NENA Company
Identifier and include on each
pseudo-ANI TN database record.
Include every pseudo-ANI TN
record within each E911 service
area.
Include blocks of pseudo-ANI
numbers for each antenna face (or
PSAP) to handle concurrent 911
calls. Pseudo-ANI numbers must
be geographically valid for the
E911 selective routing tandem
used to route calls to PSAPs.
Work directly with Intrado to
include the Carrier's Pseudo-ANI
numbers in the appropriate
Security Tables and to identify
the appropriate E2 interface to
invoke for Phase 2.
CG-EWCG-001
Issue 3, January 6, 2004

Advertisement

Table of Contents
loading

Table of Contents