The Design and Implementation of a Speech Codec for Packet Switched Networks Stephen Charles Hall University of Wollongong

Total Page:16

File Type:pdf, Size:1020Kb

The Design and Implementation of a Speech Codec for Packet Switched Networks Stephen Charles Hall University of Wollongong University of Wollongong Research Online University of Wollongong Thesis Collection University of Wollongong Thesis Collections 1988 The design and implementation of a speech codec for packet switched networks Stephen Charles Hall University of Wollongong Recommended Citation Hall, Stephen Charles, The design and implementation of a speech codec for packet switched networks, Doctor of Philosophy thesis, Department of Electrical and Computer Engineering, University of Wollongong, 1988. http://ro.uow.edu.au/theses/1352 Research Online is the open access institutional repository for the University of Wollongong. For further information contact Manager Repository Services: [email protected]. THE DESIGN AND IMPLEMENTATION OF A SPEECH CODEC FOR PACKET SWITCHED NETWORKS A thesis submitted in fulfilment of the requirements for the award of the degree of DOCTOR OF PHILOSOPHY from THE UNIVERSITY OF WOLLONGONG by STEPHEN CHARLES HALL, B.Sc. (Eng.) Department of Electrical and Computer Engineering 1988 I hereby certify that no part of the work presented in this thesis has been previously submitted for a degree to any university or similar institution. Stephen Charles Hall 29/08/88 CONTENTS ACKNOWLEDGEMENTS ABSTRACT CHAPTER 1 : INTRODUCTION 1.1 Background to the thesis 1.1.1 Segregated and integrated communications networ 1.1.2 Local and wide area networks 1.1.3 Problems associated with the addition of voice data LAN 1.1.4 The need for a special speech codec 1.2 Aims of the thesis 1.3 An overview of the thesis contents 1.4 Original contributions made by the thesis 1.5 Publications by the author related to the thesis CHAPTER 2 : THE NETWORK AND WORKSTATIONS 2.1 Introduction 2.2 The network 2.2.1 Configuration 2.2.2 Switching technique 2.2.3 Capacity 2.2.4 Channel errors 2.2.5 Delay 2.3 The workstations 2.3.1 Functional components n 2.3.2 Structure of the packet voice terminal 15 2.3.3 Conclusions 18 CHAPTER 3 : SPEECH QUALITY IN PACKET VOICE COMMUNICATIONS 20 3.1 Introduction 20 3.2 Signal distortion 20 3.2.1 Introduction 20 3.2.2 Fixed distortion 21 3.2.3 Variable distortion 21 3.2.4 Summary and conclusions 22 3.3 Signal delay 22 3.3.1 Types of delay 22 3.3.2 The subjective effects of fixed delay 23 3.3.3 Delay minimization 24 3.3.4 Summary and conclusions 26 3.4 Signal loss 26 3.4.1 Introduction 26 3.4.2 Lost packets 27 3.4.3 The effect of lost packets on speech quality 27 3.4.4 Summary and conclusions 28 3.5 Signal corruption 29 3.5.1 Introduction 29 3.5.2 Corruption of voice packets 29 3.5.3 Summary and conclusions 31 3.6 Silence elimination 31 3.6.1 Introduction 31 3.6.2 The advantage of silence elimination 31 3.6.3 The disadvantages of silence elimination 32 3.6.4 Summary and conclusions iii 3.7 Overal1 speech qual ity 35 3.7.1 Quality standards 35 3.7.2 Maximizing the overall quality 36 3.7.3 Conclusions 37 CHAPTER 4 : THE ACCESS CONTROLLER 38 4.1 Introduction 38 4.2 Contention-based vs. ordered access 38 4.3 Priority access 39 4.4 Summary and conclusions 40 CHAPTER 5 : THE NETWORK VOICE PROTOCOL 41 5.1 Introduction 41 5.2 Packetization 41 5.2.1 Introduction 41 5.2.2 Factors influencing the optimum packet length 42 5.2.3 Instantaneous variations in the packet length 42 5.2.4 Long-term variations in the packet length 43 5.2.5 Summary and conclusions 44 5.3 Prioritization 44 5.3.1 Introduction 44 5.3.2 The relative prioritization of voice and data 45 5.3.3 Prioritization of voice according to its activity 45 5.3.4 Prioritization of voice according to its transmission history 46 5.3.5 Summary and conclusions 47 5.4 Flow control 47 5.4.1 Introduction 47 5.4.2 Flow control of voice traffic 48 IV 5.4.3 Network load estimation/prediction 49 5.4.4 Summary and conclusions 49 5.5 Synchronization 49 5.5.1 Introduction 49 5.5.2 Essential issues in packet voice synchronization 50 5.5.2.1 Packet ordering 50 5.5.2.2 Identification of the type of a missing packet 51 5.5.2.3 Correction of variable packet delay 52 5.5.2.4 Clock frequency matching 55 5.5.2.5 Temporal distortion of silence intervals 55 5.5.2.6 Adjustment of the playout rate 56 5.5.3 A taxonomy of packet voice synchronization schemes 57 5.5.3.1 Introduction 57 5.5.3.2 Synchronization schemes with exact knowledge of Dv 57 5.5.3.3 Synchronization schemes with approximate knowledge of Dv 58 5.5.3.4 Synchronization schemes with no knowledge of Dv 58 5.5.4 Summary and conclusions 60 5.6 Fil 1 -in 61 5.6.1 Introduction 61 5.6.2 Simple packet fill-in schemes 61 5.6.3 Advanced packet fill-in schemes 62 5.6.4 Summary and conclusions 64 CHAPTER 6 : CODEC REQUIREMENTS 65 6.1 Introduction 65 6.2 Input signal characteristics 65 6.3 Signal distortion 66 6.4 Signal delay 66 6.5 Bandwidth efficiency 66 6.6 Variable rate coding 67 6.7 Robustness to bit errors 67 6.8 Robustness to packet loss 68 6.9 Tandem coding 68 6.10 Voice conferencing 69 6.11 Voice messaging 70 6.12 PCM compatibility 71 6.13 Non-speech code 71 6.14 Control information 72 6.15 Packetization 72 6.16 Implementation 72 CHAPTER 7 : DESIGN AND DEVELOPMENT OF THE CODEC 74 7.1 Introduction 74 7.2 Variable rate coding 74 7.2.1 Introduction 74 7.2.2 Variable rate coding in DCM systems 75 7.2.2.1 Techniques 75 7.2.2.2 Issues 76 7.2.3 Variable rate coding in packet switched networks 77 7.2.3.1 Techniques 77 7.2.3.2 Issues 78 7.2.4 Multi rate coding 79 7.2.5 Embedded coding 80 7.2.6 Issues in the design of the embedded code 81 7.2.6.1 Code hierarchy 81 VI 7.2.6.2 Explicit noise coding vs. coarse feedback coding 82 7.2.6.3 Code format 83 7.2.7 Summary and conclusions 84 7.3 Redundancy reduction coding 85 7.3.1 Introduction 85 7.3.2 Waveform coders vs. vocoders 85 7.3.3 Time domain vs. frequency domain waveform coders 86 7.3.4 Predictive waveform coders 86 7.3.5 Concl usions 92 7.4 The adaptive quantizer in the primary coder 92 7.4.1 Introduction 92 7.4.2 Adaptation vs. companding 93 7.4.3 Backward vs. forward adaptation 96 7.4.4 Syllabic, instantaneous and hybrid adaptation 96 7.4.5 The optimization of backward adaptive quantizers 98 7.4.6 The Generalized Hybrid Adaptive Quantizer 101 7.4.6.1 Introduction 101 7.4.6.2 The syllabic compandor 101 7.4.6.3 The instantaneously adaptive quantizer 103 7.4.7 Derivation of the GHAQ optimization procedure 107 7.4.8 Performance measures 110 7.4.9 The training set 111 7.4.10 Evaluation of the GHAQ optimization procedure 112 7.4.10.1 Introduction 112 7.4.10.2 Convergence 113 7.4.10.3 Design optimality 117 7.4.10.4 The effect of p on the performance of the GHAQ 118 7.4.10.5 The effect of L on the performance of the GHAQ 120 7.5 The predictor in the primary coder 120 Vll 7.5.1 Introduction 120 7.5.2 An analytic approach to predictor optimization 122 7.5.3 An iterative approach to predictor optimization 123 7.6 Comparative performance tests 124 7.6.1 Introduction 124 7.6.2 Test conditions 125 7.6.3 Results for the 1-bit adaptive quantizers 126 7.6.3.1 The optimum coder parameters 126 7.6.3.2 SNR results 128 7.6.3.3 Step responses 130 7.6.4 Results for the 2-bit adaptive quantizers 133 7.6.4.1 The optimum coder parameters 133 7.6.4.2 SNR results 135 7.6.4.3 Step responses 135 7.6.5 Summary and conclusions 135 7.7 Development of the secondary coding algorithm 138 7.7.1 Introduction 138 7.7.2 Selection of the coding technique 138 7.7.3 Adaptation of the secondary quantizer 139 7.7.4 Embedded code generation 140 7.7.5 Optimization of the secondary quantizer 143 7.7.5.1 The optimization procedure 143 7.7.5.2 Convergence of the optimization procedure 144 7.7.5.3 Results 145 7.8 Recovery from bit errors 147 7.8.1 Introduction 147 7.8.2 Effects of bit errors on the primary decoder 148 7.8.3 The development of the robust GHAQ 150 7.8.4 Performance of the robust GHAQ 153 viii 7.8.5 Idle channel noise in the robust GHAQ 154 7.8.6 The effects of bit errors on the secondary decoder 155 7.9 Recovery from missing packets 155 7.9.1 Introduction 155 7.9.2 The effect of missing packets on the embedded decoder 156 7.9.3 A mechanism for recovering from missing packets 157 7.10 Packetization issues 158 7.11 Prioritization and flow control issues 160 7.11.1 Introduction 160 7.11.2 Speech prioritization in DCM systems 161 7.11.3 Fixed-rate performance of the embedded coder 162 7.11.4 Generation of the prioritization variables 165 7.11.5 Use of the prioritization variables 167 7.12 Packet voice synchronization and fill-in issues 170 7.12.1 Synchronization 170 7.12.2 Fi I 1 -in 170 CHAPTER 8 : IMPLEMENTATION OF THE CODEC 173 8.1 Introduction 173 8.2 Implementation strategy 173 8.3 An overview of the codec card 173 8.4 Signal conditioning and conversion 175 8.5 The embedded codec 176 8.5.1 Choice of digital signal processor 176 8.5.2 Program structure and timing 176 8.5.3 Arithmetic considerations 179 8.5.3.1 Fixed-point notation 179 8.5.3.2 Arithmetic overflow 180 8.5.3.3 Truncation error 180 IX 8.5.4 Code and control information formats 181 8.5.4.1 Introduction 181 8.5.4.2 Transmit group structure 182 8.5.4.3 Receive group structure 184 8.5.4.4 Codec control/status word 185 8.5.5 DSP resource usage 187 8.6 The codec/network voice protocol interface 188 8.6.1 Introduction 188 8.6.2 Information transfer techniques 188 8.6.3 Memory buffers and blocks 189 8.6.4 Information parcels and frames 189 8.7 The card control/status register 192 8.8 Card configuration options 194 CHAPTER 9 : EVALUATION OF THE CODEC 196 9.1 Introduction 196 9.2 Performance comparison with log PCM 196 9.3 Dynamic range 199 9.4 Signal delay 200 9.5 Robustness to bit errors and missing packets 200 9.6 Idle channel noise 202 9.7 Transcoding 203 9.8 Subjective quality
Recommended publications
  • On IP Networking Over Tactical Links
    On IP Networking over Tactical Links Claude Bilodeau The work described in this document was sponsored by the Department of National Defence under Work Unit 5co. Defence R&D Canada √ Ottawa TECHNICAL REPORT DRDC Ottawa TR 2003-099 Communications Research Centre CRC-RP-2003-008 August 2003 On IP networking over tactical links Claude Bilodeau Communications Research Centre The work described in this document was sponsored by the Department of National Defence under Work Unit 5co. Defence R&D Canada - Ottawa Technical Report DRDC Ottawa TR 2003-099 Communications Research Centre CRC RP-2003-008 August 2003 © Her Majesty the Queen as represented by the Minister of National Defence, 2003 © Sa majesté la reine, représentée par le ministre de la Défense nationale, 2003 Abstract This report presents a cross section or potpourri of the numerous issues that surround the tech- nical development of military IP networking over disadvantaged network links. In the first sec- tion, multi-media services are discussed with regard to three aspects: applications, operational characteristics and service models. The second section focuses on subnetworks and bearers; mainly impairments caused by characteristics of the wireless environment. An overview of the Iris tactical bearers is provided as an example of a tactical IP environment. The last section looks at how IP can integrate these two elements i.e. multi-media services and impaired sub- network links. These three sections are unified by a common theme, quality of service, which runs in the background of the discussions. Résumé Ce rapport présente une coupe transversale ou pot-pourri de questions reliées au développe- ment technique des réseaux militaires IP pour des liaisons défavorisées.
    [Show full text]
  • The People Who Invented the Internet Source: Wikipedia's History of the Internet
    The People Who Invented the Internet Source: Wikipedia's History of the Internet PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 22 Sep 2012 02:49:54 UTC Contents Articles History of the Internet 1 Barry Appelman 26 Paul Baran 28 Vint Cerf 33 Danny Cohen (engineer) 41 David D. Clark 44 Steve Crocker 45 Donald Davies 47 Douglas Engelbart 49 Charles M. Herzfeld 56 Internet Engineering Task Force 58 Bob Kahn 61 Peter T. Kirstein 65 Leonard Kleinrock 66 John Klensin 70 J. C. R. Licklider 71 Jon Postel 77 Louis Pouzin 80 Lawrence Roberts (scientist) 81 John Romkey 84 Ivan Sutherland 85 Robert Taylor (computer scientist) 89 Ray Tomlinson 92 Oleg Vishnepolsky 94 Phil Zimmermann 96 References Article Sources and Contributors 99 Image Sources, Licenses and Contributors 102 Article Licenses License 103 History of the Internet 1 History of the Internet The history of the Internet began with the development of electronic computers in the 1950s. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks. In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced.
    [Show full text]
  • Past, Present and Future of IP Telephony
    International Conference on Communication Theory, Reliability, and Quality of Service Past, Present and Future of IP Telephony Vasco N. G. J. Soares1,3, Paulo A. C. S. Neves1,3, and Joel J. P. C. Rodrigues2,3 1 Superior School of Technology, Polytechnic Institute of Castelo Branco, C. Branco, Portugal 2Department of Informatics, University of Beira Interior, Covilhã, Portugal 3Institute of Telecommunications, Networks and Multimedia Group, Portugal [email protected]; [email protected]; [email protected] Abstract instance, to seamless use of both voice and data messaging. Since the late 90's IP telephony, commonly referred VoIP is basically the means to grab audio and video to as Voice over IP (VoIP), has been presented as a in digital form, divide it in small chunks that can be revolution on communications enabling the possibility transferred through the network as packets. After, it to converge historically separated voice and data reassembles the chunks on the other side in a networks, reducing costs, and integrating voice, data convenient way so that people having a phone and video on applications. This paper presents a study conversation have the idea of a circuit switching over the standard VoIP protocols H.323, Session ordinary call, as shown in Figure 1. Initiation Protocol (SIP), Media Gateway Control VoIP presents a shift on corporate voice Protocol (MGCP), and H.248/Megaco. Given the fact communications where the traditional Private Branch that H.323 and SIP are more widespread than the eXchange (PBX) based systems were used to provide others, we focus our study on them. For each of these internal cost-free communications and sharing of protocols we describe and discuss its main external telephone lines.
    [Show full text]
  • Network Working Group J. Postel Request for Comments: 790 ISI September 1981 Obsoletes Rfcs
    Network Working Group J. Postel Request for Comments: 790 ISI September 1981 Obsoletes RFCs: 776, 770, 762, 758, 755, 750, 739, 604, 503, 433, 349 Obsoletes IENs: 127, 117, 93 ASSIGNED NUMBERS This Network Working Group Request for Comments documents the currently assigned values from several series of numbers used in network protocol implementations. This RFC will be updated periodically, and in any case current information can be obtained from Jon Postel. The assignment of numbers is also handled by Jon. If you are developing a protocol or application that will require the use of a link, socket, port, protocol, or network number please contact Jon to receive a number assignment. Jon Postel USC - Information Sciences Institute 4676 Admiralty Way Marina del Rey, California 90291 phone: (213) 822-1511 ARPANET mail: POSTEL@ISIF Most of the protocols mentioned here are documented in the RFC series of notes. The more prominent and more generally used are documented in the Protocol Handbook [17] prepared by the Network Information Center (NIC). Some of the items listed are undocumented. In all cases the name and mailbox of the responsible individual is indicated. In the lists that follow, a bracketed entry, e.g., [17,iii], at the right hand margin of the page indicates a reference for the listed protocol, where the number cites the document and the "iii" cites the person. Postel [Page 1] RFC 790 September 1981 Assigned Numbers Network Numbers ASSIGNED NETWORK NUMBERS This list of network numbers is used in the internet address [33]. The Internet Protocol (IP) uses a 32 bit address and divides that address into a network part and a "rest" or local address part.
    [Show full text]
  • IP Telephony Applicability in Cloud Computing Aplicabilidad De Telefon´Ia IP En La Computacion´ En La Nube
    JOURNAL OF SCIENCE AND RESEARCH: REVISTA CIENCIA E INVESTIGACION,´ E-ISSN: 2528-8083, VOL. 3, CITT2017, PP. 128-133 128 IP Telephony Applicability in Cloud Computing Aplicabilidad de telefon´ıa IP en la computacion´ en la nube Francisco Palacios1,*, Mitchell Vasquez´ Bermudez´ 1,2,y, Fausto Orozco1,z, and Diana Espinoza Villon´ 1,⊗ 1Universidad de Guayaquil, Ecuador 2Universidad Agraria del Ecuador ffrancisco.palacioso;mitchell.vasquezb;fausto.orozcol;[email protected] [email protected] Received: August 15, 2017 — Accepted: September 15, 2017 How to cite: Palacios, F., Vasquez´ Bermudez,´ M., Orozco, F., & Espinoza Villon,´ D. (2018). Aplicabilidad de telefon´ıa IP en la computacion´ en la nube. Journal of Science and Research: Revista Ciencia e Investigacion,´ 3(CITT2017), 128-133. https://doi.org/10.26910/ issn.2528-8083vol3issCITT2017.2018pp128-133 Abstract—This paper carries out a research related to the applicability of VoIP over Cloud Computing to guarantee service stability and elasticity of the organizations. In this paper, Elastix is used as an open source software that allows the management and control of a Private Branch Exchange (PBX); and for developing, it is used the services given Amazon Web Services due to their leadership and experience in cloud computing providing security, scalability, backup service and feasibility for the users. Keywords—VoIP, Cloud Computing, Elastix, Amazon Web Service. Resume—Este trabajo lleva a cabo una investigacion´ relacionada con la aplicabilidad de VoIP sobre Cloud Computing para garantizar la estabilidad del servicio y la elasticidad de las organizaciones. En este documento, Elastix se utiliza como un software de codigo´ abierto que permite gestion´ y control de una central telefonica´ privada (PBX); y para el desarrollo, se utilizan los servicios prestados a Amazon Web Services debido a su liderazgo y experiencia en computacion´ en la nube que brinda seguridad, escalabilidad y servicio de respaldo y viabilidad para los usuarios.
    [Show full text]
  • 762 USC-ISI Internet Experiment Note: 127 January 1980
    Network Working Group J. Postel Request for Comments: 762 USC-ISI Internet Experiment Note: 127 January 1980 Obsoletes RFCs: 758, 755, 750,739, 604, 503, 433, 349 Obsoletes IENs: 117, 93 ASSIGNED NUMBERS This Network Working Group Request for Comments documents the currently assigned values from several series of numbers used in network protocol implementations. This RFC will be updated periodically, and in any case current information can be obtained from Jon Postel. The assignment of numbers is also handled by Jon. If you are developing a protocol or application that will require the use of a link, socket, etc. please contact Jon to receive a number assignment. Jon Postel USC - Information Sciences Institute 4676 Admiralty Way Marina del Rey, California 90291 phone: (213) 822-1511 ARPANET mail: POSTEL@ISIE Most of the protocols mentioned here are documented in the RFC series of notes. The more prominent and more generally used are documented in the Protocol Handbook [1] prepared by the Network Information Center (NIC). In the lists that follow a bracketed number, e.g. [1], off to the right of the page indicates a reference for the listed protocol. Postel [Page 1] RFC 762 January 1980 IEN 127 Assigned Numbers Network Numbers ASSIGNED NETWORK NUMBERS This list of network numbers is used in the internetwork, the field is 8 bits in size. Assigned Network Numbers Decimal Octal Name Network References ------- ----- ---- ------- ---------- 0 0 Reserved 1 1 BBN-PR BBN Packet Radio Network 2 2 SF-PR-1 SF Bay Area Packet Radio Network (1) 3 3 BBN-RCC BBN RCC Network 4 4 SATNET Atlantic Satellite Network 5 5 SILL-PR Ft.
    [Show full text]
  • SDN & NFV: Modern Networking Technologies
    SDN & NFV: Modern Networking Technologies 2014 International Science and Technology Conference «Modern Networking Technologies (MoNeTec)» Moscow, Russia, October 27–29, 2014 Proceedings Partners MOSCOW www.arccn.ru 2014 SDN & NFV: Next Generation of Computational Infrastructure 2014 International Science and Technology Conference «Modern Networking Technologies (MoNeTec)» Moscow, Russia, October 27–29, 2014 Proceedings МОСКВА – 2014 УДК 004.4 ББК 32.973.202-018.2 У67 Под общей редакцией д.ф.-м.н., чл.-корр. РАН, профессора Р.Л. Смелянского Управление и виртуализация в современных сетях (Сети 2014: SDN&NFV): Тру- У67 ды Международной научной конференции; Москва, 27–29 октября 2014 г. / Под общ. ред. Р.Л. Смелянского. – М.: МАКС Пресс, 2014. – 174 с. ISBN 978-5-317-04829-7 Международная научно-техническая конференция «Управление и виртуализация в современ- ных сетях» (Сети 2014: SDN&NFV) посвящена двум наиболее перспективным трендам, про- явившимся в последние несколько лет - Программно Конфигурируемые Сети (SDN) и Виртуа- лизация Сетевых Функций (NFV). Эти тенденции обещают сформировать эволюцию отрасли Интернета и облачной инфраструктуры в Программно-Конфигурируемые Инфраструктуры. Се- тевые операторы и поставщики облачных сервисов уже начали освоение этих технологий, а наиболее смелые уже начали активно испытывать и разворачивать решения на базе SDN и NFV. В конференции приняли участие видные представители международных научных кругов из различных международных проектов, направленных на создание новых способов и инстру- ментов в области SDN&NFV для создания новой инфраструктуры для научных исследований. В трудах конференции представлены доклады, где широко обсуждаются различные аспекты SDN & NFV технологий. Конференция проводится при финансовой поддержке Министерства образования и науки Российской Федерации ГК №14.598.11.0012 и Университета Иннополис (г.
    [Show full text]
  • Protocol Layering and Internet Policy
    University of Pennsylvania Carey Law School Penn Law: Legal Scholarship Repository Faculty Scholarship at Penn Law 5-2013 Protocol Layering and Internet Policy Christopher S. Yoo University of Pennsylvania Carey Law School Follow this and additional works at: https://scholarship.law.upenn.edu/faculty_scholarship Part of the Systems and Communications Commons Repository Citation Yoo, Christopher S., "Protocol Layering and Internet Policy" (2013). Faculty Scholarship at Penn Law. 454. https://scholarship.law.upenn.edu/faculty_scholarship/454 This Article is brought to you for free and open access by Penn Law: Legal Scholarship Repository. It has been accepted for inclusion in Faculty Scholarship at Penn Law by an authorized administrator of Penn Law: Legal Scholarship Repository. For more information, please contact [email protected]. Yoo p2.docx (DO NOT DELETE) 5/8/2013 11:07 AM ARTICLE PROTOCOL LAYERING AND INTERNET POLICY CHRISTOPHER S. YOO† An architectural principle known as protocol layering is widely recognized as one of the foundations of the Internet’s success. In addition, some scholars and industry participants have urged using the layers model as a central organizing principle for regulatory policy. Despite its importance as a concept, a comprehensive analysis of protocol layering and its implications for Internet policy has yet to appear in the literature. This Article attempts to correct this omission. It begins with a detailed description of the way the five-layer model developed, introducing protocol layering’s central features, such as the division of functions across layers, infor- mation hiding, peer communication, and encapsulation. It then discusses the model’s implications for whether particular functions are performed at the edge or in the core of the network, contrasts the model with the way that layering has been depicted in the legal commentary, and analyzes attempts to use layering as a basis for competition policy.
    [Show full text]
  • Msc Thesis Thesis Title: Designing and Optimization of VOIP PBX Infrastructure by Naveed Younas Rana Student ID
    MSc Thesis Thesis Title: Designing and optimization of VOIP PBX infrastructure By Naveed Younas Rana Student ID: 1133670 Department of computer science and technology University of Bedfordshire Supervisor: Dr. Ali Mansour 1 Abstract In the recent decade, communication has stirred from the old wired medium such as public switched telephone network (PSTN) to the Internet. Present, Voice over Internet Protocol (VoIP) Technology used for communication on internet by means of packet switching technique. Several years ago, an internet protocol (IP) based organism was launched, which is known as Private Branch Exchange "PBX", as a substitute of common PSTN systems. For free communication, probably you must have to be pleased with starting of domestic calls. Although, fairly in few cases, VoIP services can considerably condense our periodical phone bills. For instance, if someone makes frequent global phone calls, VoIP talk service is the actual savings treat which cannot achieve by using regular switched phone. VoIP talk services strength help to trim down your phone bills if you deal with a lot of long-distance (international) and as well as domestic phone calls. However, with the VoIP success, threats and challenges also stay behind. In this dissertation, by penetration testing one will know that how to find network vulnerabilities how to attack them to exploit the network for unhealthy activities and also will know about some security techniques to secure a network. And the results will be achieved by penetration testing will indicate of proven of artefact and would be helpful to enhance the level of network security to build a more secure network in future.
    [Show full text]
  • Voice Over Ip
    SUBMITTED BY ANSHUL KUNDAJE GEETALI BHATIA MANGESH DALVI MEGHNA HARIDAS SUMERU NANDI GUIDE DR. (MRS.) NANDINI. K. JOG ELECTRICAL ENGINEERING DEPARTMENT V.J. TECHNOLOGICAL INSTITUTE UNIVERSITY OF BOMBAY 2000-2001 1 VOICE OVER IP A Project Report submitted to the University of Bombay (Mumbai) in partial fulfillment of the requirements for the degree of Bachelor of Engineering (Electrical) By NAME ROLL.NO. UNIV.NO. SIGN. ANSHUL KUNDAJE GH-97729 GEETALI BHATIA GH-97705 MANGESH DALVI GH-97712 MEGHNA HARIDAS GH-97732 SUMERU NANDI GH-97736 Under the guidance of Dr. (Mrs.) Nandini. K. Jog Professor of Electronics Department of Electrical Engineering Veermata Jijabai Technological Institute Department of Electrical Engineering Veermata Jijabai Technological Institute Matunga, Mumbai 400 019 VEERMATA JIJABAI TECHNOLOGICAL INSTITUTE DEPARTMENT OF ELECTRICAL ENGINEERING 2 CERTIFICATE OF APPROVAL This is to certify that the dissertation titled “ VOICE OVER IP” is a bonafide record of dissertation work done by ANSHUL KUNDAJE GH-97729 GEETALI BHATIA GH-97705 MANGESH DALVI GH-97712 MEGHNA HARIDAS GH-97732 SUMERU NANDI GH-97736 Under the guidance of Dr. (Mrs.) N. K. Jog , Professor of Electronics, Department of Electrical Engineering; in partial fulfillment of the requirement for the degree of Bachelor of Engineering (Electrical) of the University of Bombay (Mumbai) Guide Principal Dr. (Mrs.) N. K. Jog Dr. S. D. Varwandkar 3 CERTIFICATE This is to certify that the project titled “ VOICE OVER IP” is a bonafide record of the project work done by ANSHUL KUNDAJE GH-97729 GEETALI BHATIA GH-97705 MANGESH DALVI GH-97712 MEGHNA HARIDAS GH-97732 SUMERU NANDI GH-97736 During the Academic Year 2000-2001 under the guidance of Dr.
    [Show full text]
  • IP Telephony
    Consultation Paper on IP Telephony Pakistan Telecommunication Authority Consultation Paper on IP Telephony Document classification Public Consultation Paper 2006 Document version V03- 2nd Revision Filename IP Telephony Policy Options Version release date 1st August 2007 Present Subject Paper for Consultation with stakeholders Version Date Author Changes to previous version 01 09/02 Naseem Ahmed Modifications incorporated after internal discussion at Vohra PTA Consultant Technical PTA 02 14/03 Naseem Ahmed Modification incorporated to take IP Telephony Vohra authorization for Internet/Broadband operators out of the Consultant recommended framework Technical PTA 03 01/08 Naseem Ahmed Final Version Vohra Consultant Technical PTA Paper for consultation with stakeholders 2 Consultation Paper on IP Telephony Table of Content Executive Summary...........................................................................................................5 1. INTRODUCTION ....................................................................................................11 A. IP Telephony-Technology/Service...................................................................11 B. Advantages .......................................................................................................12 1. Cost..............................................................................................................12 2. Types ...........................................................................................................13 C. Functionality.....................................................................................................13
    [Show full text]
  • Security in Voice Over Internet Protocol (Voip)
    Republic of Iraq Ministry of Higher Education and Scientific Research Al-Nahrain University College of Science Security in Voice over Internet Protocol (VoIP) A Thesis Submitted to the College of Science, Al-Nahrain University In Partial Fulfillment of the Requirements for The Degree of Master of Science in Computer Science By Kawthar Abed Al-Elah Abed Al-Rasul Mashkour (B.Sc. 2004) Supervisor Dr. Ban N. Al-Kallak April 2008 Rabi' Thani 1429 PDF created with pdfFactory Pro trial version www.pdffactory.com ِﺒﺴﻡ ِﭐ ﷲِ ﭐﻟﺭ ﺤ ﻤٰ ﻥ ِ ﭐﻟﺭ ﺤِﻴﻡ ِ (ﭐ ﻟﹾ ﺤﻤ ﺩ ﷲِ ﭐ ﻟﱠﺫِﻱ ﻫﺩٰﻨﹶﺎ ﻟِﻬٰﺫﹶﺍ ﻭﻤﺎ ﻜﹸﻨﱠﺎ ﻟِﻨﹶﻬ ﺘﹶﺩِ ﻯ ﻟﹶ ﻭ ﻵ ﺃَ ﻥ ﻫﺩٰﻨﹶﺎ ﭐ ﷲُ ) ﺼﺩﻕ ﺍﷲ ﺍﻟﻌﻅﻴﻡ ﺍﻻﻋﺭﺍﻑ (43) PDF created with pdfFactory Pro trial version www.pdffactory.com I Dedication I would like to dedicate this work to the member of my beloved family and all those who supported me in finishing this thesis. Kawthar II Acknowledgement First, I would like to thank God, for all the blessings that have given us. Second, I would like to express my sincere gratitude and appreciation to my supervisor Dr. Ban N. Al-Kallak for her valuable guidance, supervision and untiring efforts during the course of this work. Grateful thanks for the Head of Department of Computer Science Dr. Taha S. Bashaga, all staff and employees. Finally, my very special thanks to my family, my friends for their encouragement during the period of my studies. III Abstract In today’s environment nearly all end-to-end telephone connections are set up via circuit-switching using Public Switched Telephone Network (PSTN), whereby node-to-node links in an origin/destination connection are set up via interconnects, and the connection is maintained exclusively for exchanges of information between the origin and destination until it is torn down.
    [Show full text]