Skip to content

IP Location

Best in textbook rentals since 2012!

ISBN-10: 0072263776

ISBN-13: 9780072263770

Edition: 2007

Authors: Martin Dawson, James Winterbottom, Martin Thomson

List price: $69.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

The same method is used to determine IP location for devices connected to all types of networks-DSL,WiFi,WiMAX Covers real-world applications for IP location such as emergency services, fleet and asset tracking, call routing, navigation, and staff location in hot desk environments
Customers also bought

Book details

List price: $69.95
Copyright year: 2007
Publisher: McGraw-Hill Osborne
Publication date: 11/13/2006
Binding: Hardcover
Pages: 360
Size: 7.75" wide x 9.50" long x 1.00" tall
Weight: 1.738
Language: English

Foreword
Acknowledgments
Introduction
A Brief History of Location Services and Concepts
Emergency Services: A Case Study of an Important Location-Based Service
Cellular Network Architecture for North American Emergency Services
Location Determination in Cellular Networks
Uncertainty and Confidence in Location Determination
The Rise of VoIP and the Creation of an IP Location Imperative
The Internet Services Model
Nomadicity and Mobility
The i2 Architecture
Literal Location vs. Location Reference
A Question of Trust
The LIS: A Location Server for Access Networks
A Generic Architecture
Reference
Location, Presence, and Privacy
Presence
The Presence Model
Subscriptions
The Presence Document
Using Presence for Location Information
The GEOPRIV Model
GEOPRIV Roles
Applying the GEOPRIV Model
Fitting the GEOPRIV Model to i2
A Unified Presence Model for Location
The PIDF-LO
Location Information Types
PIDF-LO Privacy Requests
Controlling Access to Location Information
Privacy for 3GPP Location Services
Security for Privacy
References
Location Determination and the Access Location Entity
Location Measurements
The Access Location Entity (ALE)
Using Measurements
The Flexible LIS-ALE Protocol (FLAP)
Extensions
FLAP Messages
Acquiring Measurements from the Target/Device
Device-Assisted A-GNSS or A-GPS
Other Device-Based Methods
Hybrid Location Determination
References
The LIS, Location Acquisition, and the HELD Protocol
The Location Information Server
Location Distribution to the Target
The LIS Interfaces
The HELD Protocol and Semantics
Target Location Acquisition
Requesting a Location Reference
Context Data
Updating a Context
Location Assertion
Reporting Errors
Third-Party Interface Authentication
The Trusted-Party Query Interface
LIS Discovery Using DNS
External IP Address Determination
Domain Determination
DNS SRV Record LIS Discovery
Types of LIS
Summary
References
IP Location in Enterprise Networks
Enterprise Network Access Technologies
Wired Ethernet Networks
WiFi Networks
Location Determination in Enterprise Networks
Bridge MIB Interrogations
DHCP Relay Location Determination
Location Acquisition Alternatives and Comparisons to HELD
Who Can Get Location?
Link Layer Discovery Protocol Media Endpoint Discovery (LLDP-MED)
DHCP Location Acquisition
HELD Location Acquisition
Enterprise Location Considerations
NATs, Firewalls, and VPNs
Data Management
Enterprise Location Applications
Staff-Locator/Asset Tracker Application
An Emergency Application
Enterprise Location Conclusions
References
IP Location in Wireline Public Carrier Networks
Digital Subscriber Line (DSL) Networks
DSL Entities
DSL Interfaces
Protocol Background
Location Determination and Acquisition in DSL Networks
DSL Network Summary
Cable Networks
The Anatomy of Cable Networks
Location in Cable Networks
Summary
References
WiFi and Ad Hoc Wireless Networks
802.11 Wireless LANs
Basic Wireless Location Determination Toolset
Nearest Transmitter or Access Point
Ranging Measurements
Direction
Signal Strength Measurements
Time Difference of Arrival (TDOA)
Ad Hoc Location Determination Methods
Network Topology in Location Determination
Architectural Considerations
Ad Hoc Networks
ALE Overlays
The Wireless Network Controller as an ALE
Location Support in 802.11v
IP Mobility and Location Acquisition
References
IP Location in Wireless Public Carrier Networks
Cellular Data Networks
Location in GPRS Networks
Location in CDMA 1xEVDO
Unlicensed Mobile Access
WiMAX
Location in an Open Services Network
Location in an IMS Network
Summary
References
Device Interactions in Location Determination
The Role of the Device in the Location Architecture
Device Measurements
Autonomous Location Determination
Preventing Location Fraud
Architectural Goals
Autonomous Location Determination
Device Independence
The LIS Provides Credentialed Location
A LIS-Provided Location URI
Location Measurements in HELD
Location Assertion
Device Callback
Capability Negotiation
Device-Based Technologies
A User-Entered Location
LLDP Measurements
Wireless LAN Measurements
RFID Beacons
GNSS and Assisted-GNSS
Summary
References
Privacy Considerations for Internet Location
Privacy Legislation
Location Privacy Mechanisms in 3GPP
Gaining Consent
Generalized Consent
Simplifying Privacy
Architectures for Privacy Protection
Architectural Choices
Focus on Law Enforcement
Location Acquisition Challenges for Law Enforcement
References
Abridged FLAP Specification
BEEP Protocol Binding
BEEP Transport
BEEP and XML
FLAP Versions
Error Handling
FLAP Messages
Schema UML
Core Message Definitions
Management Message Definitions
Common Type Definitions
Result Codes
Extensions
Access Technology Extensions
Additional Message Types
Vendor-Specific Content
FLAP Base XML Schema
Access Technology Extensions
DHCP Technology Extension
Ethernet Switch Technology Extension
DHCP Lease Query Technology Extension
RADIUS Technology Extension
References
HELD Base Schema
HELD Schema
Digital Signature for PIDF-LO
What Needs to Be Signed
The Digital Signature
PIDF-LO Transformation
Algorithms
Signature Key Data
XML Definitions
XML Schema
XPath Filter
Example
Security Considerations
References
HELD Protocol Bindings
HELD HTTP Protocol Binding
The HELD HTTP Binding WSDL Document
HELD BEEP Protocol Binding
References
HELD Identity Extensions
HELD Identity Extensions Schema
Identity Extension Examples
DHCP Example
L2TP Example
LLDP Example
Glossary
Index