Voice over IP in Wireless Heterogeneous Networks: Signaling, Mobility and Security (Signals and Communication Technology)
- Book ID
- 125970639
- Publisher
- Springer
- Year
- 2008
- Tongue
- English
- Weight
- 2 MB
- Edition
- 1
- Category
- Standards
- ISBN-13
- 9781402066306
No coin nor oath required. For personal study only.
โฆ Synopsis
The requirements for good quality VoIP communications are difficult to achieve in a time-varying environment due to channel errors and traffic congestion and across different systems. The provision of VoIP in wireless heterogeneous networks requires a set of time-efficient control mechanisms to support a VoIP session with acceptable quality. The focus ofVoice over IP in Wireless Heterogeneous Networksis on mechanisms that affect the VoIP user satisfaction while not explicitly involved in the media session. This relates to the extra delays introduced by the security and the signaling protocols used to set up an authorized VoIP session and to the disruption caused by the user mobility during the session.Voice over IP in Wireless Heterogeneous Networksthus investigates and proposes cross-layer techniques for realizing time-efficient control mechanisms for VoIP: signaling, mobility and security.
โฆ Subjects
comp_osnet
๐ SIMILAR VOLUMES
The focus of this book is on mechanisms that affect the VoIP user satisfaction while not explicitly involved in the media session. The book thus investigates and proposes cross-layer techniques for realizing time-efficient control mechanisms for VoIP.
This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protoco
This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protoco