Flylib.com
List of Figures
Previous page
Table of content
Next page
Introduction
Figure 1: Logical network location versus geographic location.
Figure 2: The standard Earth geoid, as defined in WGS 84.
Chapter 1: A Brief History of Location Services and Concepts
Figure 1.1: A vertical fleet application showing vehicle GPS, network, and application server.
Figure 1.2: Adding the "You are here" to Internet applications.
Figure 1.3: ANI-ALI in the emergency network-a wireline phone lookup.
Figure 1.4: Atypical GSM cellular network emergency service architecture.
Figure 1.5: Location technologies in cellular networks.
Figure 1.6: TA breakdown
Figure 1.7: Uncertainty expressed as different shapes.
Figure 1.8: Non-linear location/confidence relationship.
Figure 1.9: Obtaining an area of uncertainty at a specific confidence level.
Figure 1.10: FCC-prescribed cellular uncertainty and confidence.
Figure 1.11: The NENA i2 architecture.
Figure 1.12: Spoofing a location in an emergency call.
Figure 1.13: Location architecture functional layers.
Figure 1.14: The LIS centralized architecture.
Chapter 2: Location, Presence, and Privacy
Figure 2.1: The presence model.
Figure 2.2: The GEOPRIV abstract model.
Figure 2.3: GEOPRIV roles in i2-location by-reference.
Figure 2.4: A generalized location by-reference configuration.
Figure 2.5: GEOPRIV roles in i2-location by-value.
Figure 2.6: GEOPRIV roles in i2-location by-value.
Figure 2.7: Shapes for the representation of uncertainty in PIDF-LO.
Figure 2.8: An ellipse is a two-dimensional conical section.
Figure 2.9: The ellipsoid shape adds a third dimension by including a height parameter.
Figure 2.10: A prism is useful in representing a floor of a building.
Figure 2.11: An arc-band shape and its defining parameters.
Figure 2.12: The structure of a common-policy document.
Figure 2.13: Delegating the evaluation of privacy rules in 3GPP.
Chapter 3: Location Determination and the Access Location Entity
Figure 3.1: Different types of ALEs for different access networks.
Figure 3.2: ALEs in the GSM access network (GERAN).
Figure 3.3: Location measurements are combined with a database to determine location.
Figure 3.4: An ALE sends a Notification message to indicate a change in the network.
Figure 3.5: A Resynchronization Request triggers multiple Resynchronization Responses.
Figure 3.6: An Access Query is the synchronous method for retrieving ALE data.
Chapter 4: The LIS, Location Acquisition, and the HELD Protocol
Figure 4.1: LIS to GEOPRIV mapping.
Figure 4.2: The location by-value model.
Figure 4.3: The location by-reference model.
Figure 4.4: Location type negotiations.
Figure 4.5: Basic LIS interfaces.
Figure 4.6: An unqualified location request.
Figure 4.7: A qualified location request.
Figure 4.8: HELD context creation messaging.
Figure 4.9: HELD context lifeTime and LocationURI usage.
Figure 4.10: Location assertion using HELD.
Figure 4.11: An external IP address discovery problem.
Figure 4.12: Learning an externally routable IP address via STUN.
Figure 4.13: DNS SRV LIS discovery.
Figure 4.14: A Gateway LIS configuration.
Figure 4.15: A Proxy LIS configuration.
Figure 4.16: The Proxy-Gateway LIS.
Chapter 5: IP Location in Enterprise Networks
Figure 5.1: Wired Ethernet.
Figure 5.2: A basic WiFi network.
Figure 5.3: A wireless network controller network.
Figure 5.4: An SNMP bridge MIB ALE.
Figure 5.5: LIS static provisioning.
Figure 5.6: ARP table polling.
Figure 5.7: DHCP-assisted IP-to-MAC binding.
Figure 5.8: DHCP Lease Query ALE.
Figure 5.9: A DHCP relay in the core network.
Figure 5.10: A DHCP relay in the edge switch.
Figure 5.11: A DHCP Lease Query ALE extension.
Figure 5.12: PABX on-behalf-of location request.
Figure 5.13: An LLDP-MED Class III device network.
Figure 5.14: DHCP location acquisition.
Figure 5.15: A HELD location request.
Figure 5.16: A HELD on-behalf-of location request.
Figure 5.17: A Gateway LIS operating as a relay.
Figure 5.18: A client-based locator sequence diagram.
Figure 5.19: A DNS dynamic update.
Figure 5.20: Asset and staff tracking configuration.
Figure 5.21: Emergency routing with a literal location.
Figure 5.22: Emergency routing with an explicit location URI.
Figure 5.23: Emergency routing with an implicit location reference.
Chapter 6: IP Location in Wireline Public Carrier Networks
Figure 6.1: Basic DSL deployment.
Figure 6.2: DSL access entities.
Figure 6.3: DSL segments.
Figure 6.4: U-Interface protocol stacks.
Figure 6.5: A10-interface protocol stacks.
Figure 6.6: PPP data encapsulation.
Figure 6.7: PPPoE PADI message with TAG.
Figure 6.8: PPPoE data encapsulation.
Figure 6.9: L2TP network architecture.
Figure 6.10: A generic DSL LIS configuration.
Figure 6.11: IP routing over the A10-Interface using ATM and RADIUS.
Figure 6.12: Switch and RANP-LIS provisioning.
Figure 6.13: A session establishment and measurement collection.
Figure 6.14: Requesting location.
Figure 6.15: ATM layer 2 over the service provider segment.
Figure 6.16: ATM layer-2 service provider segment location acquisition.
Figure 6.17: 1-1 VLAN forwarding on service provider segment.
Figure 6.18: Dual-tagged VLAN on a service provider segment location acquisition.
Figure 6.19: N-1 VLAN forwarding.
Figure 6.20: N-1 VLAN forwarding message flow.
Figure 6.21: PPPoE intermediary circuit tag.
Figure 6.22: N-1 VLAN layer-2 forwarding using DHCP.
Figure 6.23: L2TP over the service provider segment.
Figure 6.24: Data flow for L2TP over the service provider segment.
Figure 6.25: A modern cable network configuration.
Figure 6.26: A cable network MAC frame.
Figure 6.27: Cable Internet configuration.
Figure 6.28: Cable Internet location configuration.
Figure 6.29: Cable network location acquisition.
Chapter 7: WiFi and Ad Hoc Wireless Networks
Figure 7.1: An infrastructure WLAN relies on access points.
Figure 7.2: Participants in an ad hoc network are active in routing messages.
Figure 7.3: Determining the distance between two transceivers.
Figure 7.4: Using trilateration in two dimensions from three access points.
Figure 7.5: A directional antenna can be used like a radar system to determine a direction.
Figure 7.6: Time difference of arrival measurements used to determine location.
Figure 7.7: Degradation of precision caused by multiple hops in an ad hoc network.
Figure 7.8: The final precision is greatly affected by the precision at each hop.
Figure 7.9: Using multiple paths to refine a location estimate.
Figure 7.10: A LIS can use infrastructure (access points) to acquire location measurements.
Figure 7.11: IP mobility allows changes in an IP address by tunneling messages.
Chapter 8: IP Location in Wireless Public Carrier Networks
Figure 8.1: Packet data location architecture.
Figure 8.2: The GPRS architecture.
Figure 8.3: The LIS in a GPRS network.
Figure 8.4: Mobile IP architecture.
Figure 8.5: The 1xEVDO network.
Figure 8.6: A LIS in the 1xEVDO network.
Figure 8.7: A UMA in a GSM network.
Figure 8.8: A UMA using LIS functionality.
Figure 8.9: WiMAX as a wired broadband alternative.
Figure 8.10: An access network conundrum.
Figure 8.11: Wireless access location solution.
Figure 8.12: The basic IMS architecture.
Figure 8.13: An integrated location solution.
Chapter 9: Device Interactions in Location Determination
Figure 9.1: Device roles in completely independent operation.
Figure 9.2: An independent device is able to use a presence service to simplify its role.
Figure 9.3: Delegating the responsibility for credentialed location to the LIS.
Figure 9.4: The LIS can be used to provide publicly accessible location URIs.
Figure 9.5: The LIS could cache location information for later use.
Figure 9.6: The LIS uses a callback to access device-based information on demand.
Figure 9.7: A capabilities indication is made so the device can be updated as circumstances change.
Figure 9.8: An LLDP-capable device can provide measurements using SNMP.
Figure 9.9: A device that can read RFID tags can provide those codes as measurements.
Figure 9.10: Device-assisted A-GNSS using SUPL messaging that directly involves the LIS.
Chapter 10: Privacy Considerations for Internet Location
Figure 10.1: Two privacy principles from the Australian Privacy Act of 1988.
Figure 10.2: Privacy control in a 3GPP GSM network.
Figure 10.3: The LIS assumes many of the privacy roles in this architecture.
Figure 10.4: To simplify rule management, an external service can host privacy preferences.
Figure 10.5: The LIS can use a PPR to delegate the evaluation of privacy rules.
Figure 10.6: A presence service assumes much of the responsibility for controlling privacy.
Figure 10.7: The i2 emergency impact on the presence privacy architecture.
Appendix A: Abridged Flap Specification
Figure A.1: A high-level message schema UML.
Previous page
Table of content
Next page
IP Location
ISBN: 0072263776
EAN: 2147483647
Year: 2004
Pages: 129
Authors:
Martin Dawson
,
James Winterbottom
,
Martin Thomson
BUY ON AMAZON
MySQL Stored Procedure Programming
Transactional Support in MySQL
Using MySQL Stored Programs in Applications
Conclusion
Conclusion
Stored Programs as an Alternative to Expensive SQL
Interprocess Communications in Linux: The Nooks and Crannies
System Memory
Permissions
Summary
Creating and Accessing Semaphore Sets
Using Signals in Threads
The .NET Developers Guide to Directory Services Programming
ADSI Schema Mapping Mechanism
Basics of Writing Attribute Values
Security in Directory Services Programming
Creating Users
Summary
Programming Microsoft ASP.NET 3.5
ASP.NET Core Server Controls
The ADO.NET Object Model
Web Forms User Controls
Configuration and Deployment
HTTP Handlers and Modules
Microsoft VBScript Professional Projects
Conditional Logic and Iterative Structures
VBScript and the WSH
Project Case Study Desktop Customization and Deployment
Customizing the Start Menu and Quick Launch Toolbar
Using Configuration Files to Control Script Execution
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Some Basic SQL*Plus Commands
Saving and Retrieving the Buffer
Executing SQL*Plus Commands
Controlling Variable Substitution
Tuning and Timing
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies