Flylib.com
IP Location
IP Location
ISBN: 0072263776
EAN: 2147483647
Year: 2004
Pages: 129
Authors:
Martin Dawson
,
James Winterbottom
,
Martin Thomson
BUY ON AMAZON
Table of Contents
Back Cover
IP Location
Foreword
Introduction
Why a Book on IP Location?
References
Chapter 1: A Brief History of Location Services and Concepts
Emergency Services: A Case Study of an Important Location-Based Service
Uncertainty and Confidence in Location Determination
The Rise of VoIP and the Creation of an IP Location Imperative
Literal Location vs. Location Reference
A Question of Trust
The LIS: A Location Server for Access Networks
A Generic Architecture
Reference
Chapter 2: Location, Presence, and Privacy
The GEOPRIV Model
The PIDF-LO
Controlling Access to Location Information
References
Chapter 3: Location Determination and the Access Location Entity
Location Measurements
The Flexible LIS-ALE Protocol (FLAP)
Acquiring Measurements from the TargetDevice
References
Chapter 4: The LIS, Location Acquisition, and the HELD Protocol
The HELD Protocol and Semantics
LIS Discovery Using DNS
Types of LIS
Summary
References
Chapter 5: IP Location in Enterprise Networks
Location Determination in Enterprise Networks
Location Acquisition Alternatives and Comparisons to HELD
Enterprise Location Considerations
Enterprise Location Applications
Enterprise Location Conclusions
References
Chapter 6: IP Location in Wireline Public Carrier Networks
Cable Networks
Summary
References
Chapter 7: WiFi and Ad Hoc Wireless Networks
802.11 Wireless LANs
Basic Wireless Location Determination Toolset
Ad Hoc Location Determination Methods
Architectural Considerations
Location Support in 802.11v
IP Mobility and Location Acquisition
References
Chapter 8: IP Location in Wireless Public Carrier Networks
Cellular Data Networks
WiMAX
Location in an Open Services Network
Location in an IMS Network
Summary
References
Chapter 9: Device Interactions in Location Determination
The Role of the Device in the Location Architecture
Autonomous Location Determination
Location Measurements in HELD
Device-Based Technologies
Summary
References
Chapter 10: Privacy Considerations for Internet Location
Privacy Legislation
Location Privacy Mechanisms in 3GPP
Gaining Consent
Simplifying Privacy
Architectures for Privacy Protection
Focus on Law Enforcement
References
Appendix A: Abridged Flap Specification
FLAP Messages
Extensions
FLAP Base XML Schema
Access Technology Extensions
References
Appendix B: HELD Base Schema
Appendix C: Digital Signature for PIDF-LO
What Needs to Be Signed
The Digital Signature
XML Definitions
Example
Security Considerations
References
Appendix D: HELD Protocol Bindings
The HELD BEEP Protocol Binding
References
Appendix E: HELD Identity Extensions
Identity Extension Examples
Glossary
A-B
C-F
G-I
L-M
N-P
Q-S
T-V
W-X
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
List of Figures
List of Tables
List of Sidebars
IP Location
ISBN: 0072263776
EAN: 2147483647
Year: 2004
Pages: 129
Authors:
Martin Dawson
,
James Winterbottom
,
Martin Thomson
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Core Agile Values
The Guiding Principles of Agile Project Management
Principles and Practices
Individual Performance
Practice: Daily Interaction with the Customer Team
Beginning Cryptography with Java
The JCA and the JCE
Object Description in Cryptography Using ASN.1
Certificate Revocation and Path Validation
Key and Certificate Management Using Keystores
CMS and S/MIME
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Team change
Leading change
Restructuring
Mergers and acquisitions
IT-based process change
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
The Pulsing Heart of ASP.NET AJAX
Partial Page Rendering
The AJAX Control Toolkit
Remote Method Calls with ASP.NET AJAX
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
Attacking the Authentication Process
Oracle and PL/SQL
Triggers
Attacking Oracle PL/SQL Web Applications
DNS & BIND Cookbook
Registering Name Servers
Configuring a Name Server to Forward Queries to Another Name Server
Configuring a DHCP Server to Update a BIND Name Server
Configuring the Order in Which a Resolver Uses DNS, /etc/hosts, and NIS
Configuring a Name Server to Listen for Queries on an IPv6 Interface
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies