Flylib.com
IP Location
IP Location
ISBN: 0072263776
EAN: 2147483647
Year: 2004
Pages: 129
Authors:
Martin Dawson
,
James Winterbottom
,
Martin Thomson
BUY ON AMAZON
Table of Contents
Back Cover
IP Location
Foreword
Introduction
Why a Book on IP Location?
References
Chapter 1: A Brief History of Location Services and Concepts
Emergency Services: A Case Study of an Important Location-Based Service
Uncertainty and Confidence in Location Determination
The Rise of VoIP and the Creation of an IP Location Imperative
Literal Location vs. Location Reference
A Question of Trust
The LIS: A Location Server for Access Networks
A Generic Architecture
Reference
Chapter 2: Location, Presence, and Privacy
The GEOPRIV Model
The PIDF-LO
Controlling Access to Location Information
References
Chapter 3: Location Determination and the Access Location Entity
Location Measurements
The Flexible LIS-ALE Protocol (FLAP)
Acquiring Measurements from the TargetDevice
References
Chapter 4: The LIS, Location Acquisition, and the HELD Protocol
The HELD Protocol and Semantics
LIS Discovery Using DNS
Types of LIS
Summary
References
Chapter 5: IP Location in Enterprise Networks
Location Determination in Enterprise Networks
Location Acquisition Alternatives and Comparisons to HELD
Enterprise Location Considerations
Enterprise Location Applications
Enterprise Location Conclusions
References
Chapter 6: IP Location in Wireline Public Carrier Networks
Cable Networks
Summary
References
Chapter 7: WiFi and Ad Hoc Wireless Networks
802.11 Wireless LANs
Basic Wireless Location Determination Toolset
Ad Hoc Location Determination Methods
Architectural Considerations
Location Support in 802.11v
IP Mobility and Location Acquisition
References
Chapter 8: IP Location in Wireless Public Carrier Networks
Cellular Data Networks
WiMAX
Location in an Open Services Network
Location in an IMS Network
Summary
References
Chapter 9: Device Interactions in Location Determination
The Role of the Device in the Location Architecture
Autonomous Location Determination
Location Measurements in HELD
Device-Based Technologies
Summary
References
Chapter 10: Privacy Considerations for Internet Location
Privacy Legislation
Location Privacy Mechanisms in 3GPP
Gaining Consent
Simplifying Privacy
Architectures for Privacy Protection
Focus on Law Enforcement
References
Appendix A: Abridged Flap Specification
FLAP Messages
Extensions
FLAP Base XML Schema
Access Technology Extensions
References
Appendix B: HELD Base Schema
Appendix C: Digital Signature for PIDF-LO
What Needs to Be Signed
The Digital Signature
XML Definitions
Example
Security Considerations
References
Appendix D: HELD Protocol Bindings
The HELD BEEP Protocol Binding
References
Appendix E: HELD Identity Extensions
Identity Extension Examples
Glossary
A-B
C-F
G-I
L-M
N-P
Q-S
T-V
W-X
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
List of Figures
List of Tables
List of Sidebars
IP Location
ISBN: 0072263776
EAN: 2147483647
Year: 2004
Pages: 129
Authors:
Martin Dawson
,
James Winterbottom
,
Martin Thomson
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Deliver Customer Value
Project Size
Explore Summary
A Scaled Adaptive Framework
The Agile Vision
MySQL Clustering
Retrieving the Latest Snapshot from BitKeeper
Storage Nodes
Security and Management
Common Setups
Logging Commands
Data Structures and Algorithms in Java
Problems
Linear Search
Binary Search
Advanced Searching and Sorting
Summary
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Unauthorized Activity II
Cisco Secure IDS
Data Correlation
Policy and Procedures
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 210 Branch Circuits
Article 328 Medium-Voltage Cable Type MV
Article 334 Nonmetallic-Sheathed Cable Types NM, NMC, and NMS
Article 348 Flexible Metal Conduit Type FMC
Article 501 Class I Locations
Microsoft WSH and VBScript Programming for the Absolute Beginner
Overview of the Windows Script Host
Processing Collections of Data
Using Procedures to Organize Scripts
Combining Different Scripting Languages
Appendix A WSH Administrative Scripting
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies