Über den Autor
Hanane Fathi received her M.S. in Electrical Engineering and her Ph.D. in Wireless Communications Engineering from Aalborg University, Denmark, in 2002 and 2006 respectively. She also holds a M. S. in Information Technology from Ecole Centrale d'Electronique, Paris, France. She visited Imai laboratory at the University of Tokyo, Japan, from October 2004 to March 2005. From 2006 to 2008, she worked as a research scientist at the Research Center for Information Security (RCIS) at the National Institute of Advanced Industrial Science and Technology (AIST), Japan. Currently, she is a assistant research Professor at Aalborg University, Denmark. Her research interests include network security, wireless communications security, anonymous communication, privacy and network coding.
Shyam Chakraborty is Reader in wireless technology at University of Ulster and located at the Magee Campus. He received his M. Tech. from IIT Delhi and Licenciate and Doctor of Technology degrees from Helsinki University of Technology. He was the recipient of Academy Research Fellowship of academy of Finland (2000-2004). He was also with Ericsson Corporate Research (2005-2007). His research interests are architecture of IP based wireless networks; modelling and analysis of protocols; reliable and secure communications; VoIP and IMS over wireless systems etc.
Prof. Ramjee Prasad is editor-in-chief of the Wireless Personal Communications journal and he has published over 20 academic books in the field of Wireless Communications. He was series advisor with Artech House though now publishes his books for Springer and also Wiley.
About Authors. Acknowledgements. Preface. 1 Introduction. 1.1 Quality of Experience: Signalling, Mobility and Security. 1.2 Challenges due to the Wireless Link. 1.3 Book Outline. References. 2 IP-based Wireless Heterogeneous Networks. 2.1 Introduction. 2.2 IEEE 802.11 Wireless Local Area Networks. 2.3 IEEE 802.16 Wireless Metropolitan Area Networks. 2.4 3GPP Cellular Systems. 2.5 Integration of WLAN, WMAN and GPRS/UMTS. 2.6 The IP-based Multimedia Subsystem. References. 3 Voice over Internet Protocol. 3.1 Requirements. 3.2 Media Session. 3.3 Signalling Protocols for VoIP. 3.4 VoIP Session Setup in the IMS. References. 4 Models for Performance Analysis in Wireless Networks. 4.1 Introduction. 4.2 Analytical Model for Random Error Process. 4.3 Analytical Model for Correlated Error Process. References. 5 Impact of Security on Real-time Services: Link Layer Authentication Delay in WLAN 802.11b. 5.1 Introduction. 5.2 Security Properties. 5.3 Cryptographic Primitives. 5.4 WLAN 802.11b Security. 5.5 Security Analysis of Link Layer Authentication Protocols. 5.6 Link Layer Authentication Delay Analysis. 5.7 Evaluation of Link Layer Authentication Delay. 5.8 Concluding remarks. References. 6 Impact of Signalling on Real-time Services: SIP Session Setup Delay. 6.1 Introduction. 6.2 SIP Reliability Mechanisms. 6.3 Session Setup Delay. 6.4 Evaluation of SIP Session Setup Delay over Random Error Channels. 6.5 Evaluation of SIP Session Setup Delay over Correlated Fading Channels. 6.6 Optimization of SIP Session Setup Delay. 6.7 Concluding remarks. References. 7 Impact of Mobility on Real-time Services: Handover Delay. 7.1 Introduction. 7.2 Network Layer Mobility Protocols. 7.3 Reliability Mechanisms for Mobile IP-based Protocols. 7.4 Analysis and Optimization of Handover Delay for MIP-based Protocols. 7.5 Results of Handover Delay. 7.6 Concluding remarks.References. 8 Coupling Mobility and Security. 8.1 Introduction. 8.2 Mobile IPv6 Security. 8.3 Leakage-Resilient Authenticated Key Establishment Protocol based on RSA. 8.4 Leakage-Resilient Security Architecture proposal for MIPv6. 8.5 Analysis of Handover Delay for Proposed Architecture. 8.6 Security Analysis. 8.7 Results for Handover Delay. 8.8 Concluding remarks. References. 9 Towards Quality of Experience and Future Perspectives. 9.1 Towards Quality of Experience. 9.2 Future Perspectives. References. Index.
The specific focus of this book is on mechanisms that affect the VoIP user satisfaction while not explicitly involved in the media session (i.e. the coded speech). This relates to the extra delays introduced by the security and the signaling protocols used to set up an authorized VoIP session and to the disruption caused by the user mobility that may take place during the session. This book thus investigates and proposes techniques for realizing time-efficient control mechanisms for VoIP. One important aspect within this book is the use of correlated error processes or random error processes or both to model the FER in the channel in order to evaluate the delays incurred by control mechanisms in different error situations.