| |
| |
Foreword | |
| |
| |
Acknowledgments | |
| |
| |
Introduction | |
| |
| |
A Brief History of Location Services and Concepts | |
| |
| |
Emergency Services: A Case Study of an Important Location-Based Service | |
| |
| |
Cellular Network Architecture for North American Emergency Services | |
| |
| |
Location Determination in Cellular Networks | |
| |
| |
Uncertainty and Confidence in Location Determination | |
| |
| |
The Rise of VoIP and the Creation of an IP Location Imperative | |
| |
| |
The Internet Services Model | |
| |
| |
Nomadicity and Mobility | |
| |
| |
The i2 Architecture | |
| |
| |
Literal Location vs. Location Reference | |
| |
| |
A Question of Trust | |
| |
| |
The LIS: A Location Server for Access Networks | |
| |
| |
A Generic Architecture | |
| |
| |
Reference | |
| |
| |
Location, Presence, and Privacy | |
| |
| |
Presence | |
| |
| |
The Presence Model | |
| |
| |
Subscriptions | |
| |
| |
The Presence Document | |
| |
| |
Using Presence for Location Information | |
| |
| |
The GEOPRIV Model | |
| |
| |
GEOPRIV Roles | |
| |
| |
Applying the GEOPRIV Model | |
| |
| |
Fitting the GEOPRIV Model to i2 | |
| |
| |
A Unified Presence Model for Location | |
| |
| |
The PIDF-LO | |
| |
| |
Location Information Types | |
| |
| |
PIDF-LO Privacy Requests | |
| |
| |
Controlling Access to Location Information | |
| |
| |
Privacy for 3GPP Location Services | |
| |
| |
Security for Privacy | |
| |
| |
References | |
| |
| |
Location Determination and the Access Location Entity | |
| |
| |
Location Measurements | |
| |
| |
The Access Location Entity (ALE) | |
| |
| |
Using Measurements | |
| |
| |
The Flexible LIS-ALE Protocol (FLAP) | |
| |
| |
Extensions | |
| |
| |
FLAP Messages | |
| |
| |
Acquiring Measurements from the Target/Device | |
| |
| |
Device-Assisted A-GNSS or A-GPS | |
| |
| |
Other Device-Based Methods | |
| |
| |
Hybrid Location Determination | |
| |
| |
References | |
| |
| |
The LIS, Location Acquisition, and the HELD Protocol | |
| |
| |
The Location Information Server | |
| |
| |
Location Distribution to the Target | |
| |
| |
The LIS Interfaces | |
| |
| |
The HELD Protocol and Semantics | |
| |
| |
Target Location Acquisition | |
| |
| |
Requesting a Location Reference | |
| |
| |
Context Data | |
| |
| |
Updating a Context | |
| |
| |
Location Assertion | |
| |
| |
Reporting Errors | |
| |
| |
Third-Party Interface Authentication | |
| |
| |
The Trusted-Party Query Interface | |
| |
| |
LIS Discovery Using DNS | |
| |
| |
External IP Address Determination | |
| |
| |
Domain Determination | |
| |
| |
DNS SRV Record LIS Discovery | |
| |
| |
Types of LIS | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
IP Location in Enterprise Networks | |
| |
| |
Enterprise Network Access Technologies | |
| |
| |
Wired Ethernet Networks | |
| |
| |
WiFi Networks | |
| |
| |
Location Determination in Enterprise Networks | |
| |
| |
Bridge MIB Interrogations | |
| |
| |
DHCP Relay Location Determination | |
| |
| |
Location Acquisition Alternatives and Comparisons to HELD | |
| |
| |
Who Can Get Location? | |
| |
| |
Link Layer Discovery Protocol Media Endpoint Discovery (LLDP-MED) | |
| |
| |
DHCP Location Acquisition | |
| |
| |
HELD Location Acquisition | |
| |
| |
Enterprise Location Considerations | |
| |
| |
NATs, Firewalls, and VPNs | |
| |
| |
Data Management | |
| |
| |
Enterprise Location Applications | |
| |
| |
Staff-Locator/Asset Tracker Application | |
| |
| |
An Emergency Application | |
| |
| |
Enterprise Location Conclusions | |
| |
| |
References | |
| |
| |
IP Location in Wireline Public Carrier Networks | |
| |
| |
Digital Subscriber Line (DSL) Networks | |
| |
| |
DSL Entities | |
| |
| |
DSL Interfaces | |
| |
| |
Protocol Background | |
| |
| |
Location Determination and Acquisition in DSL Networks | |
| |
| |
DSL Network Summary | |
| |
| |
Cable Networks | |
| |
| |
The Anatomy of Cable Networks | |
| |
| |
Location in Cable Networks | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
WiFi and Ad Hoc Wireless Networks | |
| |
| |
802.11 Wireless LANs | |
| |
| |
Basic Wireless Location Determination Toolset | |
| |
| |
Nearest Transmitter or Access Point | |
| |
| |
Ranging Measurements | |
| |
| |
Direction | |
| |
| |
Signal Strength Measurements | |
| |
| |
Time Difference of Arrival (TDOA) | |
| |
| |
Ad Hoc Location Determination Methods | |
| |
| |
Network Topology in Location Determination | |
| |
| |
Architectural Considerations | |
| |
| |
Ad Hoc Networks | |
| |
| |
ALE Overlays | |
| |
| |
The Wireless Network Controller as an ALE | |
| |
| |
Location Support in 802.11v | |
| |
| |
IP Mobility and Location Acquisition | |
| |
| |
References | |
| |
| |
IP Location in Wireless Public Carrier Networks | |
| |
| |
Cellular Data Networks | |
| |
| |
Location in GPRS Networks | |
| |
| |
Location in CDMA 1xEVDO | |
| |
| |
Unlicensed Mobile Access | |
| |
| |
WiMAX | |
| |
| |
Location in an Open Services Network | |
| |
| |
Location in an IMS Network | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
Device Interactions in Location Determination | |
| |
| |
The Role of the Device in the Location Architecture | |
| |
| |
Device Measurements | |
| |
| |
Autonomous Location Determination | |
| |
| |
Preventing Location Fraud | |
| |
| |
Architectural Goals | |
| |
| |
Autonomous Location Determination | |
| |
| |
Device Independence | |
| |
| |
The LIS Provides Credentialed Location | |
| |
| |
A LIS-Provided Location URI | |
| |
| |
Location Measurements in HELD | |
| |
| |
Location Assertion | |
| |
| |
Device Callback | |
| |
| |
Capability Negotiation | |
| |
| |
Device-Based Technologies | |
| |
| |
A User-Entered Location | |
| |
| |
LLDP Measurements | |
| |
| |
Wireless LAN Measurements | |
| |
| |
RFID Beacons | |
| |
| |
GNSS and Assisted-GNSS | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
Privacy Considerations for Internet Location | |
| |
| |
Privacy Legislation | |
| |
| |
Location Privacy Mechanisms in 3GPP | |
| |
| |
Gaining Consent | |
| |
| |
Generalized Consent | |
| |
| |
Simplifying Privacy | |
| |
| |
Architectures for Privacy Protection | |
| |
| |
Architectural Choices | |
| |
| |
Focus on Law Enforcement | |
| |
| |
Location Acquisition Challenges for Law Enforcement | |
| |
| |
References | |
| |
| |
Abridged FLAP Specification | |
| |
| |
BEEP Protocol Binding | |
| |
| |
BEEP Transport | |
| |
| |
BEEP and XML | |
| |
| |
FLAP Versions | |
| |
| |
Error Handling | |
| |
| |
FLAP Messages | |
| |
| |
Schema UML | |
| |
| |
Core Message Definitions | |
| |
| |
Management Message Definitions | |
| |
| |
Common Type Definitions | |
| |
| |
Result Codes | |
| |
| |
Extensions | |
| |
| |
Access Technology Extensions | |
| |
| |
Additional Message Types | |
| |
| |
Vendor-Specific Content | |
| |
| |
FLAP Base XML Schema | |
| |
| |
Access Technology Extensions | |
| |
| |
DHCP Technology Extension | |
| |
| |
Ethernet Switch Technology Extension | |
| |
| |
DHCP Lease Query Technology Extension | |
| |
| |
RADIUS Technology Extension | |
| |
| |
References | |
| |
| |
HELD Base Schema | |
| |
| |
HELD Schema | |
| |
| |
Digital Signature for PIDF-LO | |
| |
| |
What Needs to Be Signed | |
| |
| |
The Digital Signature | |
| |
| |
PIDF-LO Transformation | |
| |
| |
Algorithms | |
| |
| |
Signature Key Data | |
| |
| |
XML Definitions | |
| |
| |
XML Schema | |
| |
| |
XPath Filter | |
| |
| |
Example | |
| |
| |
Security Considerations | |
| |
| |
References | |
| |
| |
HELD Protocol Bindings | |
| |
| |
HELD HTTP Protocol Binding | |
| |
| |
The HELD HTTP Binding WSDL Document | |
| |
| |
HELD BEEP Protocol Binding | |
| |
| |
References | |
| |
| |
HELD Identity Extensions | |
| |
| |
HELD Identity Extensions Schema | |
| |
| |
Identity Extension Examples | |
| |
| |
DHCP Example | |
| |
| |
L2TP Example | |
| |
| |
LLDP Example | |
| |
| |
Glossary | |
| |
| |
Index | |