List of Figures


Introduction

Figure 1: Logical network location versus geographic location.
Figure 2: The standard Earth geoid, as defined in WGS 84.

Chapter 1: A Brief History of Location Services and Concepts

Figure 1.1: A vertical fleet application showing vehicle GPS, network, and application server.
Figure 1.2: Adding the "You are here" to Internet applications.
Figure 1.3: ANI-ALI in the emergency network-a wireline phone lookup.
Figure 1.4: Atypical GSM cellular network emergency service architecture.
Figure 1.5: Location technologies in cellular networks.
Figure 1.6: TA breakdown
Figure 1.7: Uncertainty expressed as different shapes.
Figure 1.8: Non-linear location/confidence relationship.
Figure 1.9: Obtaining an area of uncertainty at a specific confidence level.
Figure 1.10: FCC-prescribed cellular uncertainty and confidence.
Figure 1.11: The NENA i2 architecture.
Figure 1.12: Spoofing a location in an emergency call.
Figure 1.13: Location architecture functional layers.
Figure 1.14: The LIS centralized architecture.

Chapter 2: Location, Presence, and Privacy

Figure 2.1: The presence model.
Figure 2.2: The GEOPRIV abstract model.
Figure 2.3: GEOPRIV roles in i2-location by-reference.
Figure 2.4: A generalized location by-reference configuration.
Figure 2.5: GEOPRIV roles in i2-location by-value.
Figure 2.6: GEOPRIV roles in i2-location by-value.
Figure 2.7: Shapes for the representation of uncertainty in PIDF-LO.
Figure 2.8: An ellipse is a two-dimensional conical section.
Figure 2.9: The ellipsoid shape adds a third dimension by including a height parameter.
Figure 2.10: A prism is useful in representing a floor of a building.
Figure 2.11: An arc-band shape and its defining parameters.
Figure 2.12: The structure of a common-policy document.
Figure 2.13: Delegating the evaluation of privacy rules in 3GPP.

Chapter 3: Location Determination and the Access Location Entity

Figure 3.1: Different types of ALEs for different access networks.
Figure 3.2: ALEs in the GSM access network (GERAN).
Figure 3.3: Location measurements are combined with a database to determine location.
Figure 3.4: An ALE sends a Notification message to indicate a change in the network.
Figure 3.5: A Resynchronization Request triggers multiple Resynchronization Responses.
Figure 3.6: An Access Query is the synchronous method for retrieving ALE data.

Chapter 4: The LIS, Location Acquisition, and the HELD Protocol

Figure 4.1: LIS to GEOPRIV mapping.
Figure 4.2: The location by-value model.
Figure 4.3: The location by-reference model.
Figure 4.4: Location type negotiations.
Figure 4.5: Basic LIS interfaces.
Figure 4.6: An unqualified location request.
Figure 4.7: A qualified location request.
Figure 4.8: HELD context creation messaging.
Figure 4.9: HELD context lifeTime and LocationURI usage.
Figure 4.10: Location assertion using HELD.
Figure 4.11: An external IP address discovery problem.
Figure 4.12: Learning an externally routable IP address via STUN.
Figure 4.13: DNS SRV LIS discovery.
Figure 4.14: A Gateway LIS configuration.
Figure 4.15: A Proxy LIS configuration.
Figure 4.16: The Proxy-Gateway LIS.

Chapter 5: IP Location in Enterprise Networks

Figure 5.1: Wired Ethernet.
Figure 5.2: A basic WiFi network.
Figure 5.3: A wireless network controller network.
Figure 5.4: An SNMP bridge MIB ALE.
Figure 5.5: LIS static provisioning.
Figure 5.6: ARP table polling.
Figure 5.7: DHCP-assisted IP-to-MAC binding.
Figure 5.8: DHCP Lease Query ALE.
Figure 5.9: A DHCP relay in the core network.
Figure 5.10: A DHCP relay in the edge switch.
Figure 5.11: A DHCP Lease Query ALE extension.
Figure 5.12: PABX on-behalf-of location request.
Figure 5.13: An LLDP-MED Class III device network.
Figure 5.14: DHCP location acquisition.
Figure 5.15: A HELD location request.
Figure 5.16: A HELD on-behalf-of location request.
Figure 5.17: A Gateway LIS operating as a relay.
Figure 5.18: A client-based locator sequence diagram.
Figure 5.19: A DNS dynamic update.
Figure 5.20: Asset and staff tracking configuration.
Figure 5.21: Emergency routing with a literal location.
Figure 5.22: Emergency routing with an explicit location URI.
Figure 5.23: Emergency routing with an implicit location reference.

Chapter 6: IP Location in Wireline Public Carrier Networks

Figure 6.1: Basic DSL deployment.
Figure 6.2: DSL access entities.
Figure 6.3: DSL segments.
Figure 6.4: U-Interface protocol stacks.
Figure 6.5: A10-interface protocol stacks.
Figure 6.6: PPP data encapsulation.
Figure 6.7: PPPoE PADI message with TAG.
Figure 6.8: PPPoE data encapsulation.
Figure 6.9: L2TP network architecture.
Figure 6.10: A generic DSL LIS configuration.
Figure 6.11: IP routing over the A10-Interface using ATM and RADIUS.
Figure 6.12: Switch and RANP-LIS provisioning.
Figure 6.13: A session establishment and measurement collection.
Figure 6.14: Requesting location.
Figure 6.15: ATM layer 2 over the service provider segment.
Figure 6.16: ATM layer-2 service provider segment location acquisition.
Figure 6.17: 1-1 VLAN forwarding on service provider segment.
Figure 6.18: Dual-tagged VLAN on a service provider segment location acquisition.
Figure 6.19: N-1 VLAN forwarding.
Figure 6.20: N-1 VLAN forwarding message flow.
Figure 6.21: PPPoE intermediary circuit tag.
Figure 6.22: N-1 VLAN layer-2 forwarding using DHCP.
Figure 6.23: L2TP over the service provider segment.
Figure 6.24: Data flow for L2TP over the service provider segment.
Figure 6.25: A modern cable network configuration.
Figure 6.26: A cable network MAC frame.
Figure 6.27: Cable Internet configuration.
Figure 6.28: Cable Internet location configuration.
Figure 6.29: Cable network location acquisition.

Chapter 7: WiFi and Ad Hoc Wireless Networks

Figure 7.1: An infrastructure WLAN relies on access points.
Figure 7.2: Participants in an ad hoc network are active in routing messages.
Figure 7.3: Determining the distance between two transceivers.
Figure 7.4: Using trilateration in two dimensions from three access points.
Figure 7.5: A directional antenna can be used like a radar system to determine a direction.
Figure 7.6: Time difference of arrival measurements used to determine location.
Figure 7.7: Degradation of precision caused by multiple hops in an ad hoc network.
Figure 7.8: The final precision is greatly affected by the precision at each hop.
Figure 7.9: Using multiple paths to refine a location estimate.
Figure 7.10: A LIS can use infrastructure (access points) to acquire location measurements.
Figure 7.11: IP mobility allows changes in an IP address by tunneling messages.

Chapter 8: IP Location in Wireless Public Carrier Networks

Figure 8.1: Packet data location architecture.
Figure 8.2: The GPRS architecture.
Figure 8.3: The LIS in a GPRS network.
Figure 8.4: Mobile IP architecture.
Figure 8.5: The 1xEVDO network.
Figure 8.6: A LIS in the 1xEVDO network.
Figure 8.7: A UMA in a GSM network.
Figure 8.8: A UMA using LIS functionality.
Figure 8.9: WiMAX as a wired broadband alternative.
Figure 8.10: An access network conundrum.
Figure 8.11: Wireless access location solution.
Figure 8.12: The basic IMS architecture.
Figure 8.13: An integrated location solution.

Chapter 9: Device Interactions in Location Determination

Figure 9.1: Device roles in completely independent operation.
Figure 9.2: An independent device is able to use a presence service to simplify its role.
Figure 9.3: Delegating the responsibility for credentialed location to the LIS.
Figure 9.4: The LIS can be used to provide publicly accessible location URIs.
Figure 9.5: The LIS could cache location information for later use.
Figure 9.6: The LIS uses a callback to access device-based information on demand.
Figure 9.7: A capabilities indication is made so the device can be updated as circumstances change.
Figure 9.8: An LLDP-capable device can provide measurements using SNMP.
Figure 9.9: A device that can read RFID tags can provide those codes as measurements.
Figure 9.10: Device-assisted A-GNSS using SUPL messaging that directly involves the LIS.

Chapter 10: Privacy Considerations for Internet Location

Figure 10.1: Two privacy principles from the Australian Privacy Act of 1988.
Figure 10.2: Privacy control in a 3GPP GSM network.
Figure 10.3: The LIS assumes many of the privacy roles in this architecture.
Figure 10.4: To simplify rule management, an external service can host privacy preferences.
Figure 10.5: The LIS can use a PPR to delegate the evaluation of privacy rules.
Figure 10.6: A presence service assumes much of the responsibility for controlling privacy.
Figure 10.7: The i2 emergency impact on the presence privacy architecture.

Appendix A: Abridged Flap Specification

Figure A.1: A high-level message schema UML.



IP Location
IP Location
ISBN: 0072263776
EAN: 2147483647
Year: 2004
Pages: 129

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net