click below
click below
Normal Size Small Size show me how
ENP Prep
ENP Terms
| Question | Answer |
|---|---|
| ESInet | Emergency Services IP Network: A managed, private, walled-garden IP network used for emergency services communications. |
| ESRP | Emergency Service Routing Proxy: The i3 functional element that receives SIP calls, queries the routing data, and forwards the call to the correct PSAP. |
| ECRF | Emergency Call Routing Function: The functional element that uses location data and GIS polygons to determine which PSAP covers a specific location. |
| LVF | Location Validation Function: Validates civic addresses against the GIS database before a call is made to ensure they are routeable. |
| BCF | Border Control Function: Provides a secure entry point into the ESInet (often a Session Border Controller) to protect against attacks. |
| LIS | Location Information Server: A functional element that serves the location of a device to the network or the device itself. |
| PIDF-LO | Presence Information Data Format - Location Object: The XML standard used to wrap location data (civic and geo) for transport via SIP. |
| LNG | Legacy Network Gateway: Interface allowing legacy originating networks (wireline/cellular) to send calls INTO the NG9-1-1 network. |
| LPG | Legacy PSAP Gateway: Interface allowing the NG9-1-1 network to deliver calls OUT to a legacy PSAP. |
| LSRG | Legacy Selective Router Gateway: Interface that allows a legacy Selective Router to transfer calls to/from the ESInet. |
| SI | Spatial Interface: The standardized interface between the GIS data provider and the NG9-1-1 functional elements (ECRF/LVF). |
| ANI | Automatic Number Identification: The telephone number associated with the access line from which a call originates. |
| ALI | Automatic Location Identification: The database system that displays the address/location information for the calling phone number. |
| pANI | Pseudo-ANI: A non-dialable number used to route wireless/VoIP calls through legacy networks and query the ALI database. |
| ESRK | Emergency Services Routing Key: A 10-digit number used to route a wireless call and identify the cell site/sector for ALI query. |
| ESRD | Emergency Services Routing Digit: A 10-digit number identifying a cell site or sector; used in early wireless implementations. |
| Wireless Phase I | Requires carriers to deliver the Call Back Number and the Cell Site/Sector location (Tower Address) to the PSAP. |
| Wireless Phase II | Requires carriers to deliver the Call Back Number and the specific Latitude/Longitude of the caller within an accuracy radius. |
| MSC | Mobile Switching Center: The central switching office for cellular networks that handles routing of wireless calls. |
| CAS | Call Associated Signaling: Data travels WITH the voice (in-band) to the PSAP. |
| NCAS | Non-Call Path Associated Signaling: Data travels via a separate path (out-of-band) to the ALI database; the industry standard. |
| MSAG | Master Street Address Guide: Legacy database of street names and ranges defining Emergency Service Zones (ESZs). |
| ESN | Emergency Service Number: A 3-5 digit number representing a unique combination of agencies (Police/Fire/EMS) for a zone. |
| Selective Router | A legacy switch that uses the ESN (from the MSAG) to route 9-1-1 calls to the correct PSAP. |
| CAMA | Centralized Automatic Message Accounting: The legacy trunk signaling protocol used to deliver ANI to the PSAP. |
| PBX | Private Branch Exchange: A private telephone system used within a company or organization. |
| MLTS | Multi-Line Telephone System: A system serving multiple stations (like a hotel or office); subject to Kari's Law and RAY BAUM's Act. |
| VoIP | Voice over Internet Protocol: A technology that delivers voice communications and multimedia sessions over IP networks. |
| SIP | Session Initiation Protocol: The signaling protocol used to set up, maintain, and tear down multimedia sessions (calls) in NG9-1-1. |
| RTP | Real-time Transport Protocol: The protocol that actually carries the media stream (voice/video) after SIP sets it up. |
| CODEC | Coder-Decoder: Software/hardware that compresses digital audio/video for transmission (e.g., G.711). |
| PSAP | Public Safety Answering Point: A facility equipped and staffed to receive 9-1-1 calls. |
| Primary PSAP | The first PSAP to receive the 9-1-1 call directly from the network. |
| Secondary PSAP | A PSAP that receives 9-1-1 calls only after they have been transferred from a Primary PSAP. |
| QA | Quality Assurance: The process of monitoring and evaluating performance to ensure standards are met. |
| QI | Quality Improvement: The systematic process of using QA data to improve performance and training. |
| CALEA (Accreditation) | Commission on Accreditation for Law Enforcement Agencies: A credentialing authority for public safety agencies. |
| CALEA (Law) | Communications Assistance for Law Enforcement Act: Law requiring telecoms to assist law enforcement with wiretapping. |
| ADA | Americans with Disabilities Act: Civil rights law prohibiting discrimination; mandates TTY access in PSAPs. |
| TTY | Teletypewriter: Device allowing text communication over telephone lines for the hearing impaired. |
| HCO | Hearing Carry Over: TTY mode where the caller types text and listens to the voice response. |
| VCO | Voice Carry Over: TTY mode where the caller speaks and reads the text response. |
| TRS | Telecommunications Relay Service: Operator service that translates between TTY users and voice users (7-1-1). |
| Kari's Law | Requires direct dialing of 9-1-1 (no prefix) and on-site notification for MLTS systems. |
| RAY BAUM's Act | Requires "Dispatchable Location" (Street + Room/Floor) for MLTS and IP-enabled services. |
| ICS | Incident Command System: Standardized approach to command, control, and coordination of emergency response. |
| NIMS | National Incident Management System: Comprehensive national framework for managing incidents (includes ICS). |
| EOC | Emergency Operations Center: Physical location for coordination of information and resources during an incident. |
| COOP | Continuity of Operations Plan: Planning to ensure essential functions continue during emergencies/disasters. |
| Span of Control | The number of individuals one supervisor can manage effectively; NIMS optimal is 1:5. |
| Unity of Command | The principle that each person reports to only one designated supervisor. |
| Chain of Command | The orderly line of authority within the ranks of the incident management organization. |
| Mitigation | Activities taken before an emergency to prevent or reduce its impact (e.g., building codes). |
| Preparedness | Activities taken to plan, organize, equip, and train for an emergency. |
| Response | Immediate activities during an emergency to save lives and property. |
| Recovery | Activities taken to return to normal operations after an emergency. |
| Repeater | A radio device that receives a weak signal and re-transmits it at a higher power/different frequency. |
| Simulcast | Transmitting the same signal from multiple towers simultaneously on the same frequency to blanket an area. |
| Voting Receiver | A system that compares audio from multiple receivers and selects the best quality signal for the dispatcher. |
| Trunked Radio | System where a computer assigns frequencies from a pool to talkgroups on a demand basis. |
| Talkgroup | A virtual channel ID in a trunked radio system that allows a specific group of users to communicate. |
| Interoperability | The ability of systems/agencies to work together and exchange information. |
| FMLA | Family and Medical Leave Act: Provides up to 12 weeks unpaid leave (26 for military caregiver). |
| FLSA | Fair Labor Standards Act: Establishes minimum wage, overtime pay, recordkeeping, and youth employment standards. |
| ADEA | Age Discrimination in Employment Act: Protects individuals who are 40 years of age or older. |
| Title VII | Part of the Civil Rights Act prohibiting discrimination based on race, color, religion, sex, or national origin. |
| Liability | Legal responsibility for one's acts or omissions. |
| Tort | A civil wrong that causes a claimant to suffer loss or harm resulting in legal liability. |
| Vicarious Liability | Legal responsibility assigned to one person (supervisor/agency) for the actions of another (employee). |
| Standard of Care | The level of care a reasonable person with similar training would provide in similar circumstances. |
| Maslow's Hierarchy of Needs | Motivational theory comprising a five-tier model of human needs: Physiological, Safety, Love/Belonging, Esteem, and Self-Actualization. |
| Herzberg's Two-Factor Theory | Theory stating there are certain factors that cause job satisfaction (Motivators) and a separate set that cause dissatisfaction (Hygiene Factors). |
| Hygiene Factors | Herzberg's term for maintenance factors (salary, job security, working conditions) that do not motivate but prevent dissatisfaction. |
| Motivators | Herzberg's term for factors that actually drive performance (recognition, responsibility, growth). |
| McGregor's Theory X | Management view that assumes employees are inherently lazy, dislike work, and must be coerced or controlled to perform. |
| McGregor's Theory Y | Management view that assumes employees are self-motivated, seek responsibility, and view work as natural. |
| DeShaney v. Winnebago County | Supreme Court ruling establishing that the state generally has no constitutional duty to protect individuals from private violence unless they are in state custody. |
| City of Canton v. Harris | Supreme Court ruling establishing that "failure to train" can be a basis for liability if it amounts to "deliberate indifference" to the rights of citizens. |
| Section 1983 | Federal statute allowing citizens to sue state/local government officials for violation of constitutional rights (Civil Rights Act of 1871). |
| Sovereign Immunity | Legal doctrine that prevents the government from being sued without its consent; often limited by statutes for gross negligence. |
| Public Duty Doctrine | Legal principle stating that government owes a duty of care to the general public, not to specific individuals, unless a "Special Relationship" exists. |
| Special Relationship | An exception to the Public Duty Doctrine created when a promise of help is made, causing the victim to rely on that promise to their detriment. |
| Vicarious Liability | Legal doctrine assigning liability to a supervisor or agency for the actions of a subordinate (Respondeat Superior). |
| Erlang | A dimensionless unit of telecommunications traffic measurement representing the continuous use of one circuit for one hour. |
| Busy Hour | The one-hour period during a 24-hour day where the traffic volume is at its maximum; used for sizing system capacity. |
| Grade of Service (GoS) | The probability that a call will be blocked or delayed; standard is often P.01 (1% chance of blocking). |
| Poisson Distribution | Statistical formula used to calculate the number of lines/trunks needed to handle call volume with a specific Grade of Service. |
| Baud Rate | The rate at which the signal changes state; often confused with bit rate, but technically distinct (symbols per second). |
| Decibel (dB) | A logarithmic unit used to express the ratio of two values of a physical quantity, often power or intensity (signal strength). |
| Hertz (Hz) | Unit of frequency equal to one cycle per second. |
| InterLATA | Telecommunications services (Long Distance) that originate in one LATA and terminate in another; historically regulated differently. |
| IntraLATA | Telecommunications services (Local Toll) that originate and terminate within the same LATA (Local Access and Transport Area). |
| LEC | Local Exchange Carrier: The local telephone company providing service to the subscriber's premises. |
| CLEC | Competitive Local Exchange Carrier: A company that competes with the incumbent LEC to provide local service. |
| IXC | Interexchange Carrier: A long-distance telephone company that carries traffic between LATAs. |
| Tandem Switch | A switch that connects one trunk to another; an intermediate switch that does not connect directly to the end user. |
| Central Office (CO) | The physical building where local telephone companies terminate subscriber lines and house switching equipment. |
| Demarcation Point (Demarc) | The physical point at which the public network ends and the customer's private wiring begins (often the NID). |
| Redundancy | Having duplicate components (A and B) so that if one fails, the other takes over. |
| Diversity | Having different paths, routes, or mediums (e.g., two cables entering the building from different streets) to prevent a single point of failure. |
| RTO | Recovery Time Objective: The maximum acceptable length of time that a process or service can be down after a disaster. |
| RPO | Recovery Point Objective: The maximum acceptable amount of data loss measured in time (e.g., "we can lose 15 minutes of data"). |
| UPS | Uninterruptible Power Supply: Battery backup providing immediate, short-term power to allow for safe shutdown or transfer to a generator. |
| Transfer Switch | Device that switches a load between two power sources (e.g., from Utility power to Generator power). |
| Generator | Device that converts mechanical energy to electrical energy; used for long-term backup power during outages. |
| Grounding | Connecting an electrical circuit to the earth to protect equipment and people from surges or lightning. |
| NFPA 1221 | Standard for the Installation, Maintenance, and Use of Emergency Services Communications Systems. |
| NFPA 1061 | Standard for Public Safety Telecommunications Personnel Professional Qualifications (Job descriptions/Skills). |
| ISO | International Organization for Standardization: Developer of international standards (e.g., OSI Model). |
| OSI Model | Open Systems Interconnection model: A 7-layer conceptual framework for network communications (Physical, Data Link, Network, Transport, Session, Presentation, Application). |
| Layer 1 (Physical) | The hardware layer: Cables, fiber, hubs, voltage levels (The "Road"). |
| Layer 3 (Network) | The routing layer: IP addresses, routers, packets (The "GPS"). |
| TCP | Transmission Control Protocol: A connection-oriented protocol that ensures reliable delivery of data (Slow but sure). |
| UDP | User Datagram Protocol: A connectionless protocol that sends data without checking if it arrived; used for real-time voice/video (Fast but risky). |
| Cyber Hygiene | Routine practices to maintain system health and security (password changes, patching, restricting access). |
| DDoS | Distributed Denial of Service: An attack attempting to make a service unavailable by overwhelming it with traffic from multiple sources. |
| SWATing | The act of making a hoax 9-1-1 call to draw a heavy law enforcement response (SWAT team) to a victim's address. |
| FirstNet | A federal initiative to provide a high-speed, nationwide wireless broadband network dedicated to public safety (Band 14). |
| Z-Coordinate | The vertical location information (elevation/altitude) needed for finding callers in high-rise buildings. |
| Geofence | A virtual geographic boundary capable of triggering an alert or action when a device enters or leaves the area. |
| CapEx | Capital Expenditure: Budget for acquiring or maintaining fixed assets, such as land, buildings, and major equipment (one-time costs). |
| OpEx | Operating Expenditure: Budget for the day-to-day ongoing costs of running a business, such as salaries, utilities, and rent (recurring costs). |
| Zero-Based Budgeting | A budgeting method where every expense must be justified for each new period; starts from a "zero base" rather than last year's numbers. |
| Incremental Budgeting | A budgeting method where the current budget is used as a base, with a percentage added or subtracted for the new year. |
| Line-Item Budgeting | A budgeting method that lists every specific item of expense (e.g., office supplies, fuel) separately; provides high control but little flexibility. |
| Bonding | A type of insurance that protects the agency against financial loss caused by employee theft or dishonesty. |
| Intermodulation | Radio interference caused when two or more signals mix in a receiver or transmitter to create a third "ghost" signal. |
| Receiver Desensitization | When a strong nearby signal overpowers a radio receiver, making it "deaf" to the weaker signals it is trying to hear. |
| Multipath Fading | Signal degradation caused when radio waves bounce off buildings/terrain and arrive at the receiver at slightly different times (out of phase). |
| Simplex | Radio communication where transmission occurs on the same frequency; often refers to "Direct" or "Talk-Around" mode (line of sight, no repeater). |
| Half-Duplex | Communication where data can flow in both directions, but only one direction at a time (typical Push-to-Talk radio). |
| Full-Duplex | Communication where data can flow in both directions simultaneously (typical telephone conversation). |
| Failsoft | A safety feature in trunked radio systems; if the central controller fails, the repeaters revert to conventional operation so communication is not lost. |
| Erlang B | Traffic engineering model used to calculate the number of TRUNKS needed; assumes that blocked calls are lost/cleared (busy signal). |
| Erlang C | Traffic engineering model used to calculate the number of STAFF needed; assumes that blocked calls wait in a queue (hold time). |
| Latency | The time delay it takes for a voice packet to travel from the source to the destination (measured in milliseconds). |
| Jitter | The variation in the delay of received packets; causes "choppy" or robotic audio quality in VoIP. |
| Packet Loss | When data packets fail to reach their destination; results in dropouts or silence in the conversation. |
| ADDIE Model | A framework for training program development: Analyze, Design, Develop, Implement, Evaluate. |
| Auditory Learner | A trainee who learns best by listening to lectures, discussions, and verbal instructions. |
| Visual Learner | A trainee who learns best by seeing charts, diagrams, written texts, and videos. |
| Kinesthetic Learner | A trainee who learns best by "doing," touching, moving, and hands-on practice. |
| Gantt Chart | A horizontal bar chart used in project management to illustrate a project schedule and track progress over time. |
| PERT Chart | Program Evaluation and Review Technique: A flowchart used to analyze the tasks and timelines involved in completing a project (identifies the Critical Path). |
| Critical Path | The sequence of stages determining the minimum time needed for an operation; a delay in any of these steps delays the whole project. |
| Negligent Hiring | Legal claim against an employer for hiring an employee who the employer knew (or should have known) posed a risk to others. |
| Negligent Retention | Legal claim against an employer for keeping an employee after becoming aware of their unsuitability or potential danger. |
| Quid Pro Quo | Harassment where employment decisions (hiring, promotion) are based on the employee's submission to or rejection of sexual advances. |
| Hostile Work Environment | Harassment where unwanted behavior is so severe or pervasive that it creates an intimidating or abusive work atmosphere. |
| Encumbrance | A commitment of funds for a specific purpose (like a Purchase Order) that has not yet been paid out; "money set aside." |
| Root Cause Analysis | A problem-solving method used to identify the real cause of a problem (the "why") rather than just dealing with the symptoms. |
| SWOT Analysis | A strategic planning tool used to identify Strengths, Weaknesses, Opportunities, and Threats. |