About Authors. Acknowledgements. Preface. 1 Introduction. 1.1 Quality of Experience: Signalling, Mobility and Security. 1.2 Challenges due to the Wireless Link.
1.3 Book Outline. References. 2 IP-based Wireless Heterogeneous Networks. 2.1 Introduction. 2.2 IEEE 802.
11 Wireless Local Area Networks. 2.3 IEEE 802.16 Wireless Metropolitan Area Networks. 2.4 3GPP Cellular Systems. 2.5 Integration of WLAN, WMAN and GPRS/UMTS.
2.6 The IP-based Multimedia Subsystem. References. 3 Voice over Internet Protocol. 3.1 Requirements. 3.2 Media Session.
3.3 Signalling Protocols for VoIP. 3.4 VoIP Session Setup in the IMS. References. 4 Models for Performance Analysis in Wireless Networks. 4.1 Introduction.
4.2 Analytical Model for Random Error Process. 4.3 Analytical Model for Correlated Error Process. References. 5 Impact of Security on Real-time Services: Link Layer Authentication Delay in WLAN 802.11b. 5.
1 Introduction. 5.2 Security Properties. 5.3 Cryptographic Primitives. 5.4 WLAN 802.11b Security.
5.5 Security Analysis of Link Layer Authentication Protocols. 5.6 Link Layer Authentication Delay Analysis. 5.7 Evaluation of Link Layer Authentication Delay. 5.8 Concluding remarks.
References. 6 Impact of Signalling on Real-time Services: SIP Session Setup Delay. 6.1 Introduction. 6.2 SIP Reliability Mechanisms. 6.3 Session Setup Delay.
6.4 Evaluation of SIP Session Setup Delay over Random Error Channels. 6.5 Evaluation of SIP Session Setup Delay over Correlated Fading Channels. 6.6 Optimization of SIP Session Setup Delay. 6.7 Concluding remarks.
References. 7 Impact of Mobility on Real-time Services: Handover Delay. 7.1 Introduction. 7.2 Network Layer Mobility Protocols. 7.3 Reliability Mechanisms for Mobile IP-based Protocols.
7.4 Analysis and Optimization of Handover Delay for MIP-based Protocols. 7.5 Results of Handover Delay. 7.6 Concluding remarks.References. 8 Coupling Mobility and Security.
8.1 Introduction. 8.2 Mobile IPv6 Security. 8.3 Leakage-Resilient Authenticated Key Establishment Protocol based on RSA. 8.4 Leakage-Resilient Security Architecture proposal for MIPv6.
8.5 Analysis of Handover Delay for Proposed Architecture. 8.6 Security Analysis. 8.7 Results for Handover Delay. 8.8 Concluding remarks.
References. 9 Towards Quality of Experience and Future Perspectives. 9.1 Towards Quality of Experience. 9.2 Future Perspectives. References. Index.