did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

Mobility Protocols and Handover Optimization Design, Evaluation and Application

9780470740583

Mobility Protocols and Handover Optimization Design, Evaluation and Application

  • ISBN 13:

    9780470740583

  • ISBN 10:

    0470740582

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 05/12/2014
  • Publisher: Wiley-IEEE Press
Sorry, this item is currently unavailable.

List Price $129.01 Save $1.29

New $127.72

Print on Demand: 2-4 Weeks. This item cannot be cancelled or returned.

We Buy This Book Back We Buy This Book Back!

Included with your book

Free Shipping On Every Order Free Shipping On Every Order

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Extend or Purchase Your Rental at Any Time

Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.

Summary

A guide to secured and seamless mobility among heterogeneous access networks such as WiMAX, CDMA and GPRS This book shows how an efficient system of optimized mobility management can improve the quality of service in existing forms of mobile communication. It provides a theoretical approach to mobility management, as well as developing the model for systems optimization, including practical case studies using network layer and mobility layer protocols in different deployment scenarios.& This book will provide a common framework for mobility management that considers the theoretical and practical aspects of system optimization. & & & & & & & & & Defines and discusses a common set of optimization methodologies and their application to all mobility protocols independent of IPv4 and IPv6. & & & & & & & & & Applies these technologies in the context of various layers: MAC layer 802.11 basedmobility, WiMax, CDMA, SIP, HIP, VoIP, and many more. & & & & & & & & & Provides a thorough analysis of the required steps during a mobility event such as discovery, network selection, configuration, authentication, security association, encryption, binding update, and media direction

Author Biography

Read more