Flylib.com
IP Location
IP Location
ISBN: 0072263776
EAN: 2147483647
Year: 2004
Pages: 129
Authors:
Martin Dawson
,
James Winterbottom
,
Martin Thomson
BUY ON AMAZON
Table of Contents
Back Cover
IP Location
Foreword
Introduction
Why a Book on IP Location?
References
Chapter 1: A Brief History of Location Services and Concepts
Emergency Services: A Case Study of an Important Location-Based Service
Uncertainty and Confidence in Location Determination
The Rise of VoIP and the Creation of an IP Location Imperative
Literal Location vs. Location Reference
A Question of Trust
The LIS: A Location Server for Access Networks
A Generic Architecture
Reference
Chapter 2: Location, Presence, and Privacy
The GEOPRIV Model
The PIDF-LO
Controlling Access to Location Information
References
Chapter 3: Location Determination and the Access Location Entity
Location Measurements
The Flexible LIS-ALE Protocol (FLAP)
Acquiring Measurements from the TargetDevice
References
Chapter 4: The LIS, Location Acquisition, and the HELD Protocol
The HELD Protocol and Semantics
LIS Discovery Using DNS
Types of LIS
Summary
References
Chapter 5: IP Location in Enterprise Networks
Location Determination in Enterprise Networks
Location Acquisition Alternatives and Comparisons to HELD
Enterprise Location Considerations
Enterprise Location Applications
Enterprise Location Conclusions
References
Chapter 6: IP Location in Wireline Public Carrier Networks
Cable Networks
Summary
References
Chapter 7: WiFi and Ad Hoc Wireless Networks
802.11 Wireless LANs
Basic Wireless Location Determination Toolset
Ad Hoc Location Determination Methods
Architectural Considerations
Location Support in 802.11v
IP Mobility and Location Acquisition
References
Chapter 8: IP Location in Wireless Public Carrier Networks
Cellular Data Networks
WiMAX
Location in an Open Services Network
Location in an IMS Network
Summary
References
Chapter 9: Device Interactions in Location Determination
The Role of the Device in the Location Architecture
Autonomous Location Determination
Location Measurements in HELD
Device-Based Technologies
Summary
References
Chapter 10: Privacy Considerations for Internet Location
Privacy Legislation
Location Privacy Mechanisms in 3GPP
Gaining Consent
Simplifying Privacy
Architectures for Privacy Protection
Focus on Law Enforcement
References
Appendix A: Abridged Flap Specification
FLAP Messages
Extensions
FLAP Base XML Schema
Access Technology Extensions
References
Appendix B: HELD Base Schema
Appendix C: Digital Signature for PIDF-LO
What Needs to Be Signed
The Digital Signature
XML Definitions
Example
Security Considerations
References
Appendix D: HELD Protocol Bindings
The HELD BEEP Protocol Binding
References
Appendix E: HELD Identity Extensions
Identity Extension Examples
Glossary
A-B
C-F
G-I
L-M
N-P
Q-S
T-V
W-X
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
List of Figures
List of Tables
List of Sidebars
IP Location
ISBN: 0072263776
EAN: 2147483647
Year: 2004
Pages: 129
Authors:
Martin Dawson
,
James Winterbottom
,
Martin Thomson
BUY ON AMAZON
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Formatting a Date/Time as a String
Using vectors Instead of Arrays
Science and Mathematics
Internationalization
Using Pointers to Class Members
Twisted Network Programming Essentials
Accepting Connections from Clients
Enabling Web Services Using XML-RPC
Using Authentication in a Twisted Server
Mail Clients
Using Public Keys for Authentication
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
The Three Basic Patterns of Office Solutions
Working with Word Objects
Other Events
Adding Windows Forms Controls to Your Document
Deployment
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Computer Network Hardware
Distributed Audio System Basics
Troubleshooting Audio Systems
Troubleshooting a Home Communication System
Defining Users Needs and Desires
.NET-A Complete Development Cycle
Our First .NET Application
Conclusion
The Refined Project Vision and Business Case
The Detailed Project Schedule
Implementation of Online Photo Shop
Digital Character Animation 3 (No. 3)
Secondary Action
Chapter Five. Creating Strong Poses
Creating Appealing Poses
Chapter Six. Walking and Locomotion
Chapter Nine. Acting
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies