Emergency Services Access Fundamentals Release: 7.0 Document Revision: 04.01

Total Page:16

File Type:pdf, Size:1020Kb

Emergency Services Access Fundamentals Release: 7.0 Document Revision: 04.01 Nortel Communication Server 1000 Emergency Services Access Fundamentals Release: 7.0 Document Revision: 04.01 www.nortel.com .NN43001-613 Nortel Communication Server 1000 Release: 7.0 Publication: NN43001-613 Document release date: 4 June 2010 Copyright © 2003-2010 Nortel Networks. All Rights Reserved. While the information in this document is believed to be accurate and reliable, except as otherwise expressly agreed to in writing NORTEL PROVIDES THIS DOCUMENT "AS IS" WITHOUT WARRANTY OR CONDITION OF ANY KIND, EITHER EXPRESS OR IMPLIED. The information and/or products described in this document are subject to change without notice. Nortel, Nortel Networks, the Nortel logo, and the Globemark are trademarks of Nortel Networks. All other trademarks are the property of their respective owners. 3 . Contents New in this release 9 Features 9 RLI and DMI enhancement 9 Other changes 9 How to get help 11 Contents 11 Getting help from the Nortel web site 11 Getting help over the telephone from a Nortel Solutions Center 11 Getting help from a specialist by using an Express Routing Code 12 Getting help through a Nortel distributor or reseller 12 Introduction 13 Subject 13 Applicable systems 13 Intended audience 14 Conventions 14 Related information 15 ESA Overview 17 Overview 17 ESA feature summary 18 ESA deployment options 18 Basic ESA 18 Optional internal location determination 18 Optional external location determination 18 Concepts and principles 18 Conveying information to the PSAP 19 The ALI record 19 System components 20 System Components 20 Feature operation 23 Location determination of IP phones 23 Determining that an emergency number has been dialed 23 Determining the correct PSAP responder for caller location 24 Nortel Communication Server 1000 Emergency Services Access Fundamentals NN43001-613 04.01 4 June 2010 Copyright © 2003-2010 Nortel Networks. All Rights Reserved. 4 Routing the emergency call to the correct emergency responder 24 Providing a suitable CLID to the emergency responder 24 Location management 25 Location as device attribute 25 Location data in the TNB (TN Block) 27 Location data in LIS 30 Location data in the TN table 30 Location data in the TPS 32 Location data stored on the IP phone 33 Selecting an LIS 33 Location reporting for IP phones 34 Reporting location information in the TNB 34 Printing location information using LD 81 35 Reporting of location data in the TN table 39 Inventory Location Report 41 Subnet lookup table 43 Overview 43 System messages associated with Subnet LIS 49 Interworking with External DM 50 Overview of External DM 50 Web Services interface for External DM 50 OAM Command Line Interface 51 Connection events and SNMP traps 52 Audit queries for External DM 52 Location updates with External DM 54 Re-synchronizations of the External DM 55 Package protection for External DM 56 Presence management for External DM 56 System messages for interworking with External DM 58 The ERL table 59 Administration of the ERL table 61 ERL table data conversion from ZESA table 65 System Messages 65 ERL table in EDD/Sysload 66 Location management for non-IP lines 67 Incoming Trunks 67 Non-IP phones 67 ESA enhanced routing 72 ESA enhanced routing operation 73 Local termination 74 Administration of ESA enhanced routing 74 System alarms and messages for ESA enhanced routing 78 Display of RLI routing information in CLIDVER 79 ESA enhanced routing packaging requirements 81 Nortel Communication Server 1000 Emergency Services Access Fundamentals NN43001-613 04.01 4 June 2010 Copyright © 2003-2010 Nortel Networks. All Rights Reserved. 5 Dynamic ELIN 81 Dynamic ELIN operation 82 Dynamic ELIN configuration considerations 83 Callback fallback 84 Dynamic ELIN overflow option 85 Expired Dynamic ELIN mappings 85 Emergency caller unregistrations 86 ELIN TN configuration 86 Administration for Dynamic ELIN 87 Dynamic ELIN table maintenance 88 Configuration considerations for Dynamic ELIN 89 Dynamic ELIN audit 89 System messages for Dynamic ELIN 89 Callback to Multiple Appearance DNs 92 Dynamic ELIN Survivability 92 ESA call processing 92 ERL 0 92 Route selection during ESA call processing 93 Calling number composition during ESA call processing 93 Calling number composition for trunk-initiated ESA call 94 Calling number composition for non 7/10 digit calling numbers 94 OSN TTY 95 OSN TTY Administration 96 OSN phone display 97 Operation of OSN Phone display 97 The OSN record 99 OSN record for a station phone-initiated ESA call 99 OSN record for an attendant console-initiated ESA call 101 OSN record for an incoming trunk-initiated ESA call 101 OSN record for a locally terminated ESA call 102 ESA Misdial Prevention 103 Operation of ESA Misdial Prevention 103 Administration of ESA Misdial Prevention 105 ESA Misdial configuration considerations 109 System messages 109 Multiple ESDNs 109 Multiple ESDN Overview 109 ESDNs and access code configuration 110 Administration of ESDNs 112 CLIDVER for multiple ESDNs 119 Data conversion for multiple ESDNs 120 System messages for multiple ESDN 120 Availability/survivability scenarios 121 Survivability for call server restarts or switchovers 122 Nortel Communication Server 1000 Emergency Services Access Fundamentals NN43001-613 04.01 4 June 2010 Copyright © 2003-2010 Nortel Networks. All Rights Reserved. 6 IP phone restarts due to call server restarts 122 Switching to an alternate call server 123 Survivability for geographic redundant systems 123 Survivability for signaling server restart 123 Survivability for Survivable Branch Office 123 Survivability for Survivable Remote Gateway 124 Survivability for External DM failure 124 System Management 125 Service Parameters (LD 17) 125 Access Numbers and Routing (LD 24) 126 Emergency Response Locations (LD 117) 133 Subnet Location Information Service (LD 117) 137 Dynamic Location Identification Number (LD 117) 140 ESA maintenance commands (LD 117) 142 CLI commands 144 Location Report (LD 117) 145 ESA Configuration Task List 148 ESA Feature Packaging 148 Emergency Services for Virtual Office 151 Contents 151 Introduction 151 Operating parameters 153 Feature interactions 155 Feature packaging 155 Feature implementation 155 Feature operation 156 E911 for VO 156 Background 156 Overview 156 Operation 156 Manual Update TNs 157 System messages 158 Branch Users 158 Active Call Failover 158 Basic Emergency Service When VO Logged Out 159 Contents 159 Overview 160 Configure ESA Data Block 168 Maintenance and Diagnostics 170 Warm Start 171 CLID Composition 171 Active Call Fail Over 171 Context Sensitive Soft Keys 172 Nortel Communication Server 1000 Emergency Services Access Fundamentals NN43001-613 04.01 4 June 2010 Copyright © 2003-2010 Nortel Networks. All Rights Reserved. 7 Element Manager 172 Emergency Services M911 Networked Operation 177 Contents 177 Overview 177 Assumptions 178 Dependencies 179 Feature Description 179 Networked M911 operation 179 Configuration and Provisioning 190 Overlay 16 190 Overlay 14 190 Overlay 15 190 Overlay 23 190 Print Routines, Overlay 20 191 Print Routines, Overlay 21 191 Configuration examples for 911P trunks in RDB 191 Interactions/Interworkings 192 Feature Interactions 192 Emergency Services Access for Europe, the Middle East, and Africa 197 Contents 197 Introduction 197 Feature packaging 198 Nortel Communication Server 1000 Emergency Services Access Fundamentals NN43001-613 04.01 4 June 2010 Copyright © 2003-2010 Nortel Networks. All Rights Reserved. 8 Nortel Communication Server 1000 Emergency Services Access Fundamentals NN43001-613 04.01 4 June 2010 Copyright © 2003-2010 Nortel Networks. All Rights Reserved. 9 . New in this release This chapter describes what’s new in Emergency Services Access Fundamentals (NN43001-613) for Nortel Communication Server 1000 Release 7.0. • “Features” (page 9) • “Other changes” (page 9) Features See the following sections for information about feature changes: RLI and DMI enhancement For Communication Server 1000 Release 7.0, the range of allowable Route List Index (RLI) and Digit Manipulation Index (DMI) values is increased from 0–999 to 0–1999. For more information about RLI and DMI values, see Table 34 "System alarms and messages for ERL management (LD 117)" (page 65) Other changes Revision History June 2010 Standard 04.01. This document is up-issued to support Communication Server 1000 Release 7.0. May 2009 Standard 03.01. This document is up-issued to support Communication Server 1000 Release 6.0. November 2008 Standard 02.03. This document is up-issued to support changes in technical content in chapter Emergency Services Access for Communication Server 1000 Release 5.5. October 2008 Standard 01.07. This document is up-issued to support changes in technical content for provisioning an ESA On-Site Notification phone for Communication Server 1000 Release 5.0. September 2008 Standard 02.02. This document is up-issued to support changes in technical content for provisioning an ESA On-Site Notification phone for Communication Server 1000 Release 5.5. Nortel Communication Server 1000 Emergency Services Access Fundamentals NN43001-613 04.01 4 June 2010 Copyright © 2003-2010 Nortel Networks. All Rights Reserved. 10 New in this release February 2008 Standard 01.05. This document is reissued to support extensive up-issues in technical content, for Communication Server 1000 Release 5.0. December 2007 Standard 02.01. This document is issued to support Communication Server 1000 Release 5.5. June 2007 Standard 01.03. This document has been up-issued to reflect changes in technical content for CR Q01494694. June 2007 Standard 01.02. This document is up-issued to remove the Nortel Networks Confidential statement. March 2007 Standard 01.01. This document is up-issued to support Communication Server 1000 Release 5.0. This document is renamed Emergency Services Access Fundamentals (NN43001-613) and contains information previously contained in the legacy document, Emergency Services Access (553-3001-313), now retired. August 2005 Standard 3.00. This document is up-issued to support Communication Server 1000 Release 4.5. September 2004 Standard 2.00. This document is up-issued for Communication Server 1000 Release 4.0.
Recommended publications
  • Redial: 2016 TCPA Year in Review Telephone Consumer Protection Act: Analysis of Critical Issues and Trends Introduction
    Redial: 2016 TCPA Year in Review Telephone Consumer Protection Act: Analysis of Critical Issues and Trends Introduction Eversheds Sutherland is pleased to present REDIAL, our annual in-depth analysis of key Telephone Consumer Protection Act (TCPA) issues and trends. REDIAL reports on issues affecting the industries that face TCPA class action liability. Did you know? 2ND 100,000 3X For the fourth consecutive year, The FCC has reported that as many The TCPA imposes liability of TCPA cases are the second most as 100,000 cell phone numbers $500 per call, text or fax, trebled filed type of case in federal are reassigned every day. to $1,500 if the sender’s conduct courts nationwide. is deemed willful. Eversheds Sutherland Industry Knowledge and Focus Few industries are immune from TCPA liability. In 2016, the insurance, financial services, energy and health sectors were uniquely affected by TCPA litigation. REDIAL analyzes key legal issues affecting these industries. Eversheds Sutherland tracks daily all TCPA cases filed across the country. This allows us to spot trends and keep our clients informed. We understand the law and our clients’ businesses, allowing us to design compliance and risk management programs uniquely suited to our clients' specific needs and to spot issues before they result in litigation. When litigation is filed, Eversheds Sutherland’s TCPA team has the depth of experience necessary to zealously defend its clients’ interests in court. Why Eversheds Sutherland? STRENGTH in representing STRENGTH in knowing STRENGTH in advising
    [Show full text]
  • Phoneypot: Data-Driven Understanding of Telephony Threats
    Phoneypot: Data-driven Understanding of Telephony Threats Payas Gupta Bharat Srinivasan Vijay Balasubramaniyan Mustaque Ahamad New York University Georgia Institute of Technology Pindrop Security Georgia Institute of Technology Abu Dhabi [email protected] [email protected] New York University Abu Dhabi [email protected] [email protected] Abstract—Cyber criminals are increasingly using robocalling, the telephony channel can be attributed to the availability of voice phishing and caller ID spoofing to craft attacks that are IP telephony (Voice over Internet Protocol). Such calls can being used to scam unsuspecting users who have traditionally be made at no or low cost at scale in an automated fashion trusted the telephone. It is necessary to better understand similar to email spam, and criminals are already exploiting telephony threats to effectively combat them. Although there the telephony channel to craft attacks such as voice phishing exist crowd sourced complaint datasets about telephony abuse, (vishing). Unfortunately, attacks that utilize the telephone as a such complaints are often filed after a user receives multiple calls over a period of time, and sometimes they lack important resource are more successful because people in the past have information. We believe honeypot technologies can be used to trusted the telephony channel. In fact, telephony has reportedly augment telephony abuse intelligence and improve its quality. become the weak link even for web security because cyber However, a telephony honeypot presents several new challenges criminals have used social engineering over the phone to reset that do not arise in other traditional honeypot settings. We online banking credentials to steal money [48].
    [Show full text]
  • Landline Free Ebook
    FREELANDLINE EBOOK Rainbow Rowell | 368 pages | 30 Jul 2015 | Orion Publishing Co | 9781409152125 | English | London, United Kingdom Landline () - IMDb A landline telephone also known as Landline lineland-linemain linehome phonelandlinefixed-lineand wireline is a phone that uses a metal wire or optical fiber Landline line for transmission as distinguished Landline a mobile cellular line Landline, which uses radio waves for transmission. China had more than any other country at million and the United States was second with million. The United Kingdom had The statistics show that the total number of fixed-telephone subscribers in the Landline was about 1. A fixed phone line a line that Landline not a mobile phone line can be hard-wired or cordless and typically refers to the operation of wireless devices or systems in fixed locations such as homes. Landline wireless devices usually derive their Landline power from the utility mains electricity, unlike mobile wireless or portable wireless, which tend to be battery- powered. Although mobile and portable systems can be used in Landline locations, efficiency and bandwidth are compromised Landline with fixed systems. Mobile or portable, battery-powered Landline systems can be used as Landline backups Landline fixed Landline in case of a power blackout or natural disaster. The term landline is also used Landline describe a connection between two or more points that consists Landline a Landline physical cable, as opposed to an always-available private link that is actually implemented as a circuit in a wired switched system usually the public switched telephone network. So-called leased lines are invariably of the latter type; Landline implications of a land line in this context are security and survivability.
    [Show full text]
  • Standard Operating Procedures
    WARRANT PROCEDURES Standard Operating Procedure: #1 Approved: 1/1/09 Revised: 12/13/19 The following Standard operating Procedure (SOP) applies to Warrant arrests, abstracts, cancellations, and other related administrative tasks. Arresting a Subject on a UPD Warrant • If the subject you’ve arrested has been issued a citation for our warrant, follow the procedure below. o Copy the warrant o Find the “warrant yellow”. It may be with the original warrant or in the silver box in patrol. The warrant yellow is where you will write the date, what happened with the subject (arrested and booked or issued a citation) and your initials. o Clear the warrant out of WPS via CLIPS. Use the W07-cancel wanted person screen. Print the cancellation. Using the “entered by” stamp, stamp the cancellation and sign with your initials. o Keep everything together: Original warrant, copy of warrant, your printouts, original citation, a copy of your citation, face card and warrant jacket. Leave for the dispatcher to finish clearing the warrant out of ICJIS and HTE. • If the subject you’ve arrested needs to be booked into jail, follow the procedure below. o Copy the warrant o Find the “warrant yellow”. It may be with the original warrant or in the silver box in patrol. The warrant yellow is where you will write the date, what happened with the subject (arrested and booked or issued a citation) and your initials. o The original warrant will accompany you and the subject to jail. The copy will stay with your report. o Clear the warrant out of WPS via CLIPS W07- cancel wanted person screen.
    [Show full text]
  • V-2, Page 1 of 13
    Department Order V-2, Page 1 of 13 California State University, Los Angeles Department of Public Safety NUMBER: V-2 APPROVED: Joseph Curreri, Chief of Police EFFECTIVE: August 7, 2013 SUPERSEDES: March 10, 2011 Reviewed/Revised: August 7, 2013 SUBJECT: Audio, Video, and Telephone Operations I. PURPOSE: To provide a written guideline for telephone and 9-1-1 operations related to the Communications Center. II. POLICY: The Department of Public Safety shall provide for staffing in the Communications Center 24-hours a day, seven days a week, to answer emergency calls for service. III. DEFINITIONS: Refer to Department Order V-1 for appropriate definitions. IV. PROCEDURES: A. 9-1-1 and emergency telephone systems. 1. The 9-1-1 and the campus telephone systems are utilized to provide the campus community with 24-hour, toll-free telephone access for emergency calls. a. 9-1-1 is the single emergency telephone number established for emergency calls for service, with TDD capability. b. Originating point of emergency calls displayed on the Automatic Location Identification (ALI) screen are: 1) Campus pay telephones; 2) Housing telephones; 3) Emergency Operations Center telephones; 4) Campus Emergency telephones; 5) Campus elevator telephones; and, 6) Campus telephones. 2. The following resources are to be used by the dispatcher to help identify the location of the caller, particularly when the caller is unable to speak for themselves: a. An emergency cross-reference list containing campus telephone numbers and their respective locations; b. A campus directory; and, c. AT&T’s 24-hour security hotline number. Department Order V-2, Page 2 of 13 B.
    [Show full text]
  • POLICY/PROCEDURE NUMBER: 01-LEO-001 PATROL Page 1 Of
    California State University NORTHRIDGE Department of Police Services POLICY/PROCEDURE NUMBER: 07-S.O.-011 Page 1 of 42 with five Appendices SUBJECT: POLICE SERVICES COMMUNICATIONS EFFECTIVE DATE: January 7, 2015 REVIEW DATE: January 7, 2016 AMENDS/SUPERSEDES: Department Policies 100-20: Dispatch Area Security, Feb. 5, 2001; 200-10: Elevator Response, Jan. 1, 2000; 200-7: Emergency Notification System, Oct. 15, 1999; 200-6: Emergency Telephones, Jan. 1, 2000; 100-11: Patrol Beats, Jan. 24, 2000; Department Procedural Directives 2003-07: Blue Light Emergency Telephone Information, May 12, 2003; 2003-10: Dispatch and Police Response to Elevator Emergency Calls, June 25, 2003; 2003-13: Emergency Blue Light Response Procedures, Nov. 24, 2003; 2003-11: Student Health Center requests for Ambulances, Aug. 29, 2003; 2004-006: Revision of Procedural Directive Governing On-Campus Injury Notifications, Aug. 3, 2004; 2004-06: Police Notification to Environmental Health & Safety, Aug. 3, 2004; 2004-007: Log Entry onto JDIC/CLETS, Aug. 10, 2004; 2005-01: LAPD Radio Unit Designations for CSUN PD, March 12, 2005; 2005-10: Notifications in Medical Emergency Situations, Aug. 27, 2005; 2005-11: Radio Log Documentation, Aug. 31, 2005; 2005-12: Medical Calls and Assistance from Klotz Health Center, Sept. 6, 2005; 2007-02: Police Officer Call Sign Change, Feb. 16, 2007; and 2007-03: Consolidated Dispatch, March 5, 2007; 2004-015: Science 1101 Alarm (Howitzer Room), December 23, 2004; 2004-014: Blood and Infectious Materials Clean-Up, December 6, 2004; 2005-003: RIMS/Patrol Designations, May 12, 2005; 2008-003: NOAA Public Alert Radio, September 25, 2008; August 9, 2007 version entitled Public Safety Communications; January 27, 2010 version; February 16, 2011 version; January 8, 2014 version.
    [Show full text]
  • Human Factors in Telecommunications? Links in Norway, Steinar M
    Contents Feature Special Guest editorial, Knut Nordby ........................................ 1 First installations of WDM, optical ADM and optical in-line amplifiers on long-haul cable Do we need human factors in telecommunications? links in Norway, Steinar M. Svendsen ..................... 115 Knut Nordby ................................................................. 2 Consumers, not Clients – Empowering users of new technology, Frode Volden ..................................... 9 Speech quality, usability and service quality, Norman Gleiss ............................................................ 14 Status Some current issues of Human Factors in International research and standardization telecommunications, Knut Nordby ............................. 33 activities in telecommunication: Introduction, Per Hjalmar Lehne ................................................... 125 Feedback tones in public telephone networks: Human Factors work at ETSI, Donald M. Anderson .65 The ACTS Project AC215 CRABS; Cellular Radio Access for Broadband Services, The ergonomics of teleworking, John W. Bakke ........ 78 Agne Nordbotten ....................................................... 126 Human factors of videotelephony, Knut Nordby ....... 90 AC066 OPEN – Open Pan-European Network, Torodd Olsen ............................................................ 129 A tactile marker for telephone cards: – From idea to global standard, Knut Nordby ............ 98 MoMuSys, Robert Danielsen ................................... 133 The User-Interface Design
    [Show full text]
  • Minnesota Department of Commerce Telecommunications Access Minnesota
    This document is made available electronically by the Minnesota Legislative Reference Library as part of an ongoing digital archiving project. http://www.leg.state.mn.us/lrl/lrl.asp MINNESOTA DEPARTMENT OF COMMERCE TELECOMMUNICATIONS ACCESS MINNESOTA MINNESOTA RELAY AND TELEPHONE EQUIPMENT DISTRIBUTION PROGRAM 2008 ANNUAL REPORT TO THE MINNESOTA PUBLIC UTILITIES COMMISSION DOCKET NO. P999/M-09-5 JANUARY 29, 2009 Department of Commerce – Telecommunications Access Minnesota 85 7 th Place East, Suite 600 St. Paul, Minnesota 55101-3165 [email protected] 651-297-8941 / 1-800-657-3599 TABLE OF CONTENTS TABLE OF CONTENTS .......................................................................................................1 EXECUTIVE SUMMARY ....................................................................................................2 Minnesota Relay .................................................................................................................2 Telephone Equipment Distribution (TED) Program ........................................................3 TAM Fund ..........................................................................................................................3 PROGRAM HISTORY ..........................................................................................................4 TELECOMMUNICATIONS ACCESS MINNESOTA (TAM) ............................................6 TAM Administration ..........................................................................................................6
    [Show full text]
  • Voip (Voice Over Internet Protocol)
    Seminar 2004 VoIP-Voice over Internet Protocol Department of Electronics & Communication Govt Engineering College Thrissur VoIP (Voice over Internet Protocol) Submitted On Submitted by 15-10-04 Lakshmi Menon S7 ECE 630 Co-ordinator:Muneera C R Dept of ECE GEC,TRICHUR Seminar 2004 VoIP-Voice over Internet Protocol ACKNOWLEDGEMENT First,and foremost I thank God Almighty for making this venture a success. I extend my sincere gratitude to Prof. Indiradevi, Head of Electronics and Communication Department, Govt Engineering College, Thrissur for providing me with necessary infrastructure. I would like to convey a deep sense of gratitude to the seminar co-ordinator Mrs. C R Muneera for the timely advices. I also extend my sincere thanks to my friends for their help. Dept of ECE GEC,TRICHUR Seminar 2004 VoIP-Voice over Internet Protocol ABSTRACT The development of very fast, inexpensive microprocessors and special-purpose switching chips, coupled with highly reliable fibre-optic transmission systems, has made it possible to build economical, ubiquitous, high speed packet-based data networks. Similarly, the development of very fast, inexpensive digital signal processors (DSPs) has made it practical to digitize and compress voice and fax signals into data packets. The natural evolution of these two developments is to combine digitized voice and fax packets with packet data, creating integrated data-voice networks. The voice-over-Internet protocol (VoIP) technology allows voice information to pass over IP data networks. Primarily, the cost savings that accrue from operating a single, shared network have motivated this convergence of telecommunications and data communications. VoIP allows you to make telephone calls using a computer network, over a data network like the Internet.
    [Show full text]
  • University of Florida Thesis Or Dissertation Formatting
    ISLAND CONNECTIONS: MOBILE PHONES AND SOCIAL CHANGE IN RURAL FIJI By RYAN PESECKAS A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA 2014 1 © 2014 Ryan Peseckas 2 To my parents, who have given me love and unconditional support in all of my pursuits 3 ACKNOWLEDGMENTS I wish to acknowledge the assistance of a number of individuals, communities and organizations, without whose generous help and cooperation I could not have successfully completed this research. At the University of Florida I thank first and foremost my committee chair, Gerald Murray. Jerry took me on as a graduate student in 2006 despite my lack of undergraduate training in anthropology, and has offered helpful advice and encouragement at each step of the way. Peter Collings served as a committee member for both my master’s and PhD research, and likewise has provided much advice, as well as assistance with reading drafts and writing letters of recomendation. I also wish to thank the members of my committee, C.K. Shih, Abdoulaye Kane, and Michael Bannister, for agreeing to oversee my project and for providing valuable input throughout. Also at the University of Florida I am grateful to Christopher McCarty, who went out of his way to assist me with my data analysis, and Paul Richards, who supervised me as a teaching assistant and has been very supportive in my search for post-graduate employment. Finally, I thank my fellow graduate students at the University of Florida, who have been my friends and colleagues during the 7 memorable years I have spent in Gainesville.
    [Show full text]