Browse Prior Art Database

Specifying Holes in Location-to-Service Translation (LoST) Service Boundaries (RFC5964)

IP.com Disclosure Number: IPCOM000199148D
Original Publication Date: 2010-Aug-01
Included in the Prior Art Database: 2010-Aug-27
Document File: 22 page(s) / 21K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

J. Winterbottom: AUTHOR [+2]

Abstract

The LoST protocol [RFC5222] maps service and locations to destination addresses. A LoST server does this by provisioning boundary maps or areas against service URNs. The boundary is a polygon made up of sets of geodetic coordinates specifying an enclosed area. In some circumstances, an area enclosed by a polygon, also known as an exterior polygon, may contain exception areas, or holes, that for the same service must yield a different destination to that described by the larger area.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 12% of the total text.

Internet Engineering Task Force (IETF)                   J. Winterbottom Request for Comments: 5964                                    M. Thomson Category: Standards Track                             Andrew Corporation ISSN: 2070-1721                                              August 2010

        Specifying Holes in Location-to-Service Translation (LoST)                            Service Boundaries

Abstract

   This document describes how holes can be specified in geodetic    service boundaries.  One means of implementing a search solution in a    service database, such as one might provide with a Location-to-    Service Translation (LoST) server, is described.

Status of This Memo

   This is an Internet Standards Track document.

   This document is a product of the Internet Engineering Task Force    (IETF).  It represents the consensus of the IETF community.  It has    received public review and has been approved for publication by the    Internet Engineering Steering Group (IESG).  Further information on    Internet Standards is available in Section 2 of RFC 5741.

   Information about the current status of this document, any errata,    and how to provide feedback on it may be obtained at    http://www.rfc-editor.org/info/rfc5964.

Copyright Notice

   Copyright (c) 2010 IETF Trust and the persons identified as the    document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal    Provisions Relating to IETF Documents    (http://trustee.ietf.org/license-info) in effect on the date of    publication of this document.  Please review these documents    carefully, as they describe your rights and restrictions with respect    to this document.  Code Components extracted from this document must    include Simplified BSD License text as described in Section 4.e of    the Trust Legal Provisions and are provided without warranty as    described in the Simplified BSD License.

Winterbottom & Thomson       Standards Track                    [Page 1]
 RFC 5964                 Service Boundary Holes              August 2010

 Table of Contents

   1. Introduction ....................................................2    2. Terminology .....................................................3    3. Specifying Holes ................................................3    4. GML Polygons ....................................................6    5. Holes in GML Polygons ...........................................6    6. Service Boundary Specification and Selection Algorithm ..........7    7. Security Considerations ........................................10    8. Acknowledgements ............................................