Flylib.com
IP Location
IP Location
ISBN: 0072263776
EAN: 2147483647
Year: 2004
Pages: 129
Authors:
Martin Dawson
,
James Winterbottom
,
Martin Thomson
BUY ON AMAZON
Table of Contents
Back Cover
IP Location
Foreword
Introduction
Why a Book on IP Location?
References
Chapter 1: A Brief History of Location Services and Concepts
Emergency Services: A Case Study of an Important Location-Based Service
Uncertainty and Confidence in Location Determination
The Rise of VoIP and the Creation of an IP Location Imperative
Literal Location vs. Location Reference
A Question of Trust
The LIS: A Location Server for Access Networks
A Generic Architecture
Reference
Chapter 2: Location, Presence, and Privacy
The GEOPRIV Model
The PIDF-LO
Controlling Access to Location Information
References
Chapter 3: Location Determination and the Access Location Entity
Location Measurements
The Flexible LIS-ALE Protocol (FLAP)
Acquiring Measurements from the TargetDevice
References
Chapter 4: The LIS, Location Acquisition, and the HELD Protocol
The HELD Protocol and Semantics
LIS Discovery Using DNS
Types of LIS
Summary
References
Chapter 5: IP Location in Enterprise Networks
Location Determination in Enterprise Networks
Location Acquisition Alternatives and Comparisons to HELD
Enterprise Location Considerations
Enterprise Location Applications
Enterprise Location Conclusions
References
Chapter 6: IP Location in Wireline Public Carrier Networks
Cable Networks
Summary
References
Chapter 7: WiFi and Ad Hoc Wireless Networks
802.11 Wireless LANs
Basic Wireless Location Determination Toolset
Ad Hoc Location Determination Methods
Architectural Considerations
Location Support in 802.11v
IP Mobility and Location Acquisition
References
Chapter 8: IP Location in Wireless Public Carrier Networks
Cellular Data Networks
WiMAX
Location in an Open Services Network
Location in an IMS Network
Summary
References
Chapter 9: Device Interactions in Location Determination
The Role of the Device in the Location Architecture
Autonomous Location Determination
Location Measurements in HELD
Device-Based Technologies
Summary
References
Chapter 10: Privacy Considerations for Internet Location
Privacy Legislation
Location Privacy Mechanisms in 3GPP
Gaining Consent
Simplifying Privacy
Architectures for Privacy Protection
Focus on Law Enforcement
References
Appendix A: Abridged Flap Specification
FLAP Messages
Extensions
FLAP Base XML Schema
Access Technology Extensions
References
Appendix B: HELD Base Schema
Appendix C: Digital Signature for PIDF-LO
What Needs to Be Signed
The Digital Signature
XML Definitions
Example
Security Considerations
References
Appendix D: HELD Protocol Bindings
The HELD BEEP Protocol Binding
References
Appendix E: HELD Identity Extensions
Identity Extension Examples
Glossary
A-B
C-F
G-I
L-M
N-P
Q-S
T-V
W-X
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
List of Figures
List of Tables
List of Sidebars
IP Location
ISBN: 0072263776
EAN: 2147483647
Year: 2004
Pages: 129
Authors:
Martin Dawson
,
James Winterbottom
,
Martin Thomson
BUY ON AMAZON
Cisco Voice Gateways and Gatekeepers
Case Study: Configuring an MGCP Gateway
When to Use SIP
Need for DSP Resources
Security with Gatekeepers
Basic Configuration
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter One Solutions
Chapter Three Sales Process
Chapter Five Stimulating Interest
Chapter Six Defining Pain or Critical Business Issue
Chapter Fourteen Getting Started with the Process
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Designing a Notes Application
Troubleshooting
Generate a New Document by Duplicating an Existing Document
Simple Action Agent to Modify All Documents
How to Enforce Consistent ACL Settings Across Replicas
Microsoft VBScript Professional Projects
Procedures
Developing Script Log Analyzers
Archive Management
Report Distribution and Remote Archive Management
Appendix A Windows XP Command Reference
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the TNS Listener and Dispatchers
Defeating Virtual Private Databases
Attacking Oracle PL/SQL Web Applications
Accessing the File System
Accessing the Network
FileMaker 8 Functions and Scripts Desk Reference
Get(LayoutName)
Get(RecordAccess)
RomanZenkaku()
TrimAll()
About Network Ports
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies