IP Telephony

Total Page:16

File Type:pdf, Size:1020Kb

IP Telephony Consultation Paper on IP Telephony Pakistan Telecommunication Authority Consultation Paper on IP Telephony Document classification Public Consultation Paper 2006 Document version V03- 2nd Revision Filename IP Telephony Policy Options Version release date 1st August 2007 Present Subject Paper for Consultation with stakeholders Version Date Author Changes to previous version 01 09/02 Naseem Ahmed Modifications incorporated after internal discussion at Vohra PTA Consultant Technical PTA 02 14/03 Naseem Ahmed Modification incorporated to take IP Telephony Vohra authorization for Internet/Broadband operators out of the Consultant recommended framework Technical PTA 03 01/08 Naseem Ahmed Final Version Vohra Consultant Technical PTA Paper for consultation with stakeholders 2 Consultation Paper on IP Telephony Table of Content Executive Summary...........................................................................................................5 1. INTRODUCTION ....................................................................................................11 A. IP Telephony-Technology/Service...................................................................11 B. Advantages .......................................................................................................12 1. Cost..............................................................................................................12 2. Types ...........................................................................................................13 C. Functionality.....................................................................................................13 1. Mobility.......................................................................................................13 2. Number Portability......................................................................................13 D. Drawbacks ........................................................................................................14 1. Difficulty with sending faxes ......................................................................14 2. Internet connection requirement..................................................................14 3. Power outages..............................................................................................14 2. IMPLEMENTATION CHALLENGES ...................................................................15 1. Reliability....................................................................................................17 2. Quality of Service........................................................................................17 3. Emergency calls ..........................................................................................18 4. Security........................................................................................................19 5. VOIP Numbering Schemes .........................................................................19 3. IP TELEPHONY ADOPTION.................................................................................21 1. Mass-market telephony ...............................................................................21 2. Corporate and telco use ...............................................................................22 3. Click to call .................................................................................................22 4. VOIP IN NGN VALUE CHAIN..............................................................................23 1. Internet.........................................................................................................23 2. Broad-band ..................................................................................................23 3. Voice Over Internet Protocol ......................................................................24 4. Triple Play...................................................................................................25 5. Next Generation Network ...........................................................................26 5. IP TELEPHONY ISSUES........................................................................................27 1. Legal issues .................................................................................................27 2. Policy Issues................................................................................................28 3. Regulatory Issues ........................................................................................29 4. Licensing Issues ..........................................................................................30 6. IP POLICY-GLOBAL VIEW ..................................................................................33 A. Trends in VOIP Regulation..............................................................................33 B. Categories of IP Telephony Regulation ...........................................................35 1. Liberalized Approach..................................................................................35 2. Incremental Approach .................................................................................37 3. Consultative Approach................................................................................38 4. Prohibition of IP Telephony........................................................................40 C. Current Global State of VOIP Regulation........................................................41 7. CURRENT VOIP STATUS IN PAKISTAN ...........................................................44 1. Background .................................................................................................44 2. Telecommunication Law.............................................................................44 3. Regulatory Framework................................................................................45 4. PTA Mandate ..............................................................................................46 Paper for consultation with stakeholders 3 Consultation Paper on IP Telephony 5. PTA Vision..................................................................................................46 6. Telecom Market ..........................................................................................46 8. IP Telephony Offerings ............................................................................................47 Category 1 .........................................................................................................48 Category 2 .........................................................................................................48 Category 3 .........................................................................................................48 9. OPTION EVALUATION CRITERIA .....................................................................49 1. Policy Objectives and Principles.................................................................49 2. Evaluation Criteria ......................................................................................49 10. OPTION SELECTION.............................................................................................51 1. Policy Options .............................................................................................51 2. PTA Objectives ...........................................................................................52 3. Impact of the Options on the Objectives of PTA ........................................52 11. RECOMMENDED FRAMEWORK ........................................................................54 Paper for consultation with stakeholders 4 Consultation Paper on IP Telephony Executive Summary Objective: Circuit Switching is giving way to packet switching, slowly but surely. The objective of this paper is to examine the relevance of migration to packet switching in achieving the national policy objectives for the telecommunication sector in the country. Establish the role and responsibilities of various service providers in the context of public IP Telephony Offerings and probable impact thereof on penetration and cost of telecommunication for the end user. Another objective of this document is to examine the role of IP Telephony in driving (or impeding) deployment of Next Generation Networks. IP Telephony-Introduction Voice over Internet Protocol, also called VOIP, IP Telephony, Internet telephony, Broadband telephony, Broadband Phone and Voice over Broadband, is the routing of voice conversations over the Internet or through any other IP-based network. There are quite a few implmentation challenges for IP Telephony i.e. user terminal is fed from domestic power which is prone to frequent interruptions, quality of service cannot be assured all the time, emergency calls from customers need special arrangement for propoer termination at appropriate emergency centres. With managed internet and deploymant of PSTN/IP Gateways, IP Telephony can substitute PSTN in its refined form where above problems can be addressed adequately. It can also be deployed as a cheap best effort telephony service with nomadic use. Consumer benefits stem from much lower cost of communication over IP telephony as compared to conventional telephone calls especially for international communication. IP Telephony has several characteristics and capabilities which are quite different from conventional circuit switching in many ways. Implementation of voice services over IP platform means transforming whole economic
Recommended publications
  • On IP Networking Over Tactical Links
    On IP Networking over Tactical Links Claude Bilodeau The work described in this document was sponsored by the Department of National Defence under Work Unit 5co. Defence R&D Canada √ Ottawa TECHNICAL REPORT DRDC Ottawa TR 2003-099 Communications Research Centre CRC-RP-2003-008 August 2003 On IP networking over tactical links Claude Bilodeau Communications Research Centre The work described in this document was sponsored by the Department of National Defence under Work Unit 5co. Defence R&D Canada - Ottawa Technical Report DRDC Ottawa TR 2003-099 Communications Research Centre CRC RP-2003-008 August 2003 © Her Majesty the Queen as represented by the Minister of National Defence, 2003 © Sa majesté la reine, représentée par le ministre de la Défense nationale, 2003 Abstract This report presents a cross section or potpourri of the numerous issues that surround the tech- nical development of military IP networking over disadvantaged network links. In the first sec- tion, multi-media services are discussed with regard to three aspects: applications, operational characteristics and service models. The second section focuses on subnetworks and bearers; mainly impairments caused by characteristics of the wireless environment. An overview of the Iris tactical bearers is provided as an example of a tactical IP environment. The last section looks at how IP can integrate these two elements i.e. multi-media services and impaired sub- network links. These three sections are unified by a common theme, quality of service, which runs in the background of the discussions. Résumé Ce rapport présente une coupe transversale ou pot-pourri de questions reliées au développe- ment technique des réseaux militaires IP pour des liaisons défavorisées.
    [Show full text]
  • The People Who Invented the Internet Source: Wikipedia's History of the Internet
    The People Who Invented the Internet Source: Wikipedia's History of the Internet PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 22 Sep 2012 02:49:54 UTC Contents Articles History of the Internet 1 Barry Appelman 26 Paul Baran 28 Vint Cerf 33 Danny Cohen (engineer) 41 David D. Clark 44 Steve Crocker 45 Donald Davies 47 Douglas Engelbart 49 Charles M. Herzfeld 56 Internet Engineering Task Force 58 Bob Kahn 61 Peter T. Kirstein 65 Leonard Kleinrock 66 John Klensin 70 J. C. R. Licklider 71 Jon Postel 77 Louis Pouzin 80 Lawrence Roberts (scientist) 81 John Romkey 84 Ivan Sutherland 85 Robert Taylor (computer scientist) 89 Ray Tomlinson 92 Oleg Vishnepolsky 94 Phil Zimmermann 96 References Article Sources and Contributors 99 Image Sources, Licenses and Contributors 102 Article Licenses License 103 History of the Internet 1 History of the Internet The history of the Internet began with the development of electronic computers in the 1950s. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks. In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced.
    [Show full text]
  • Past, Present and Future of IP Telephony
    International Conference on Communication Theory, Reliability, and Quality of Service Past, Present and Future of IP Telephony Vasco N. G. J. Soares1,3, Paulo A. C. S. Neves1,3, and Joel J. P. C. Rodrigues2,3 1 Superior School of Technology, Polytechnic Institute of Castelo Branco, C. Branco, Portugal 2Department of Informatics, University of Beira Interior, Covilhã, Portugal 3Institute of Telecommunications, Networks and Multimedia Group, Portugal [email protected]; [email protected]; [email protected] Abstract instance, to seamless use of both voice and data messaging. Since the late 90's IP telephony, commonly referred VoIP is basically the means to grab audio and video to as Voice over IP (VoIP), has been presented as a in digital form, divide it in small chunks that can be revolution on communications enabling the possibility transferred through the network as packets. After, it to converge historically separated voice and data reassembles the chunks on the other side in a networks, reducing costs, and integrating voice, data convenient way so that people having a phone and video on applications. This paper presents a study conversation have the idea of a circuit switching over the standard VoIP protocols H.323, Session ordinary call, as shown in Figure 1. Initiation Protocol (SIP), Media Gateway Control VoIP presents a shift on corporate voice Protocol (MGCP), and H.248/Megaco. Given the fact communications where the traditional Private Branch that H.323 and SIP are more widespread than the eXchange (PBX) based systems were used to provide others, we focus our study on them. For each of these internal cost-free communications and sharing of protocols we describe and discuss its main external telephone lines.
    [Show full text]
  • Network Working Group J. Postel Request for Comments: 790 ISI September 1981 Obsoletes Rfcs
    Network Working Group J. Postel Request for Comments: 790 ISI September 1981 Obsoletes RFCs: 776, 770, 762, 758, 755, 750, 739, 604, 503, 433, 349 Obsoletes IENs: 127, 117, 93 ASSIGNED NUMBERS This Network Working Group Request for Comments documents the currently assigned values from several series of numbers used in network protocol implementations. This RFC will be updated periodically, and in any case current information can be obtained from Jon Postel. The assignment of numbers is also handled by Jon. If you are developing a protocol or application that will require the use of a link, socket, port, protocol, or network number please contact Jon to receive a number assignment. Jon Postel USC - Information Sciences Institute 4676 Admiralty Way Marina del Rey, California 90291 phone: (213) 822-1511 ARPANET mail: POSTEL@ISIF Most of the protocols mentioned here are documented in the RFC series of notes. The more prominent and more generally used are documented in the Protocol Handbook [17] prepared by the Network Information Center (NIC). Some of the items listed are undocumented. In all cases the name and mailbox of the responsible individual is indicated. In the lists that follow, a bracketed entry, e.g., [17,iii], at the right hand margin of the page indicates a reference for the listed protocol, where the number cites the document and the "iii" cites the person. Postel [Page 1] RFC 790 September 1981 Assigned Numbers Network Numbers ASSIGNED NETWORK NUMBERS This list of network numbers is used in the internet address [33]. The Internet Protocol (IP) uses a 32 bit address and divides that address into a network part and a "rest" or local address part.
    [Show full text]
  • IP Telephony Applicability in Cloud Computing Aplicabilidad De Telefon´Ia IP En La Computacion´ En La Nube
    JOURNAL OF SCIENCE AND RESEARCH: REVISTA CIENCIA E INVESTIGACION,´ E-ISSN: 2528-8083, VOL. 3, CITT2017, PP. 128-133 128 IP Telephony Applicability in Cloud Computing Aplicabilidad de telefon´ıa IP en la computacion´ en la nube Francisco Palacios1,*, Mitchell Vasquez´ Bermudez´ 1,2,y, Fausto Orozco1,z, and Diana Espinoza Villon´ 1,⊗ 1Universidad de Guayaquil, Ecuador 2Universidad Agraria del Ecuador ffrancisco.palacioso;mitchell.vasquezb;fausto.orozcol;[email protected] [email protected] Received: August 15, 2017 — Accepted: September 15, 2017 How to cite: Palacios, F., Vasquez´ Bermudez,´ M., Orozco, F., & Espinoza Villon,´ D. (2018). Aplicabilidad de telefon´ıa IP en la computacion´ en la nube. Journal of Science and Research: Revista Ciencia e Investigacion,´ 3(CITT2017), 128-133. https://doi.org/10.26910/ issn.2528-8083vol3issCITT2017.2018pp128-133 Abstract—This paper carries out a research related to the applicability of VoIP over Cloud Computing to guarantee service stability and elasticity of the organizations. In this paper, Elastix is used as an open source software that allows the management and control of a Private Branch Exchange (PBX); and for developing, it is used the services given Amazon Web Services due to their leadership and experience in cloud computing providing security, scalability, backup service and feasibility for the users. Keywords—VoIP, Cloud Computing, Elastix, Amazon Web Service. Resume—Este trabajo lleva a cabo una investigacion´ relacionada con la aplicabilidad de VoIP sobre Cloud Computing para garantizar la estabilidad del servicio y la elasticidad de las organizaciones. En este documento, Elastix se utiliza como un software de codigo´ abierto que permite gestion´ y control de una central telefonica´ privada (PBX); y para el desarrollo, se utilizan los servicios prestados a Amazon Web Services debido a su liderazgo y experiencia en computacion´ en la nube que brinda seguridad, escalabilidad y servicio de respaldo y viabilidad para los usuarios.
    [Show full text]
  • 762 USC-ISI Internet Experiment Note: 127 January 1980
    Network Working Group J. Postel Request for Comments: 762 USC-ISI Internet Experiment Note: 127 January 1980 Obsoletes RFCs: 758, 755, 750,739, 604, 503, 433, 349 Obsoletes IENs: 117, 93 ASSIGNED NUMBERS This Network Working Group Request for Comments documents the currently assigned values from several series of numbers used in network protocol implementations. This RFC will be updated periodically, and in any case current information can be obtained from Jon Postel. The assignment of numbers is also handled by Jon. If you are developing a protocol or application that will require the use of a link, socket, etc. please contact Jon to receive a number assignment. Jon Postel USC - Information Sciences Institute 4676 Admiralty Way Marina del Rey, California 90291 phone: (213) 822-1511 ARPANET mail: POSTEL@ISIE Most of the protocols mentioned here are documented in the RFC series of notes. The more prominent and more generally used are documented in the Protocol Handbook [1] prepared by the Network Information Center (NIC). In the lists that follow a bracketed number, e.g. [1], off to the right of the page indicates a reference for the listed protocol. Postel [Page 1] RFC 762 January 1980 IEN 127 Assigned Numbers Network Numbers ASSIGNED NETWORK NUMBERS This list of network numbers is used in the internetwork, the field is 8 bits in size. Assigned Network Numbers Decimal Octal Name Network References ------- ----- ---- ------- ---------- 0 0 Reserved 1 1 BBN-PR BBN Packet Radio Network 2 2 SF-PR-1 SF Bay Area Packet Radio Network (1) 3 3 BBN-RCC BBN RCC Network 4 4 SATNET Atlantic Satellite Network 5 5 SILL-PR Ft.
    [Show full text]
  • SDN & NFV: Modern Networking Technologies
    SDN & NFV: Modern Networking Technologies 2014 International Science and Technology Conference «Modern Networking Technologies (MoNeTec)» Moscow, Russia, October 27–29, 2014 Proceedings Partners MOSCOW www.arccn.ru 2014 SDN & NFV: Next Generation of Computational Infrastructure 2014 International Science and Technology Conference «Modern Networking Technologies (MoNeTec)» Moscow, Russia, October 27–29, 2014 Proceedings МОСКВА – 2014 УДК 004.4 ББК 32.973.202-018.2 У67 Под общей редакцией д.ф.-м.н., чл.-корр. РАН, профессора Р.Л. Смелянского Управление и виртуализация в современных сетях (Сети 2014: SDN&NFV): Тру- У67 ды Международной научной конференции; Москва, 27–29 октября 2014 г. / Под общ. ред. Р.Л. Смелянского. – М.: МАКС Пресс, 2014. – 174 с. ISBN 978-5-317-04829-7 Международная научно-техническая конференция «Управление и виртуализация в современ- ных сетях» (Сети 2014: SDN&NFV) посвящена двум наиболее перспективным трендам, про- явившимся в последние несколько лет - Программно Конфигурируемые Сети (SDN) и Виртуа- лизация Сетевых Функций (NFV). Эти тенденции обещают сформировать эволюцию отрасли Интернета и облачной инфраструктуры в Программно-Конфигурируемые Инфраструктуры. Се- тевые операторы и поставщики облачных сервисов уже начали освоение этих технологий, а наиболее смелые уже начали активно испытывать и разворачивать решения на базе SDN и NFV. В конференции приняли участие видные представители международных научных кругов из различных международных проектов, направленных на создание новых способов и инстру- ментов в области SDN&NFV для создания новой инфраструктуры для научных исследований. В трудах конференции представлены доклады, где широко обсуждаются различные аспекты SDN & NFV технологий. Конференция проводится при финансовой поддержке Министерства образования и науки Российской Федерации ГК №14.598.11.0012 и Университета Иннополис (г.
    [Show full text]
  • Protocol Layering and Internet Policy
    University of Pennsylvania Carey Law School Penn Law: Legal Scholarship Repository Faculty Scholarship at Penn Law 5-2013 Protocol Layering and Internet Policy Christopher S. Yoo University of Pennsylvania Carey Law School Follow this and additional works at: https://scholarship.law.upenn.edu/faculty_scholarship Part of the Systems and Communications Commons Repository Citation Yoo, Christopher S., "Protocol Layering and Internet Policy" (2013). Faculty Scholarship at Penn Law. 454. https://scholarship.law.upenn.edu/faculty_scholarship/454 This Article is brought to you for free and open access by Penn Law: Legal Scholarship Repository. It has been accepted for inclusion in Faculty Scholarship at Penn Law by an authorized administrator of Penn Law: Legal Scholarship Repository. For more information, please contact [email protected]. Yoo p2.docx (DO NOT DELETE) 5/8/2013 11:07 AM ARTICLE PROTOCOL LAYERING AND INTERNET POLICY CHRISTOPHER S. YOO† An architectural principle known as protocol layering is widely recognized as one of the foundations of the Internet’s success. In addition, some scholars and industry participants have urged using the layers model as a central organizing principle for regulatory policy. Despite its importance as a concept, a comprehensive analysis of protocol layering and its implications for Internet policy has yet to appear in the literature. This Article attempts to correct this omission. It begins with a detailed description of the way the five-layer model developed, introducing protocol layering’s central features, such as the division of functions across layers, infor- mation hiding, peer communication, and encapsulation. It then discusses the model’s implications for whether particular functions are performed at the edge or in the core of the network, contrasts the model with the way that layering has been depicted in the legal commentary, and analyzes attempts to use layering as a basis for competition policy.
    [Show full text]
  • Msc Thesis Thesis Title: Designing and Optimization of VOIP PBX Infrastructure by Naveed Younas Rana Student ID
    MSc Thesis Thesis Title: Designing and optimization of VOIP PBX infrastructure By Naveed Younas Rana Student ID: 1133670 Department of computer science and technology University of Bedfordshire Supervisor: Dr. Ali Mansour 1 Abstract In the recent decade, communication has stirred from the old wired medium such as public switched telephone network (PSTN) to the Internet. Present, Voice over Internet Protocol (VoIP) Technology used for communication on internet by means of packet switching technique. Several years ago, an internet protocol (IP) based organism was launched, which is known as Private Branch Exchange "PBX", as a substitute of common PSTN systems. For free communication, probably you must have to be pleased with starting of domestic calls. Although, fairly in few cases, VoIP services can considerably condense our periodical phone bills. For instance, if someone makes frequent global phone calls, VoIP talk service is the actual savings treat which cannot achieve by using regular switched phone. VoIP talk services strength help to trim down your phone bills if you deal with a lot of long-distance (international) and as well as domestic phone calls. However, with the VoIP success, threats and challenges also stay behind. In this dissertation, by penetration testing one will know that how to find network vulnerabilities how to attack them to exploit the network for unhealthy activities and also will know about some security techniques to secure a network. And the results will be achieved by penetration testing will indicate of proven of artefact and would be helpful to enhance the level of network security to build a more secure network in future.
    [Show full text]
  • Voice Over Ip
    SUBMITTED BY ANSHUL KUNDAJE GEETALI BHATIA MANGESH DALVI MEGHNA HARIDAS SUMERU NANDI GUIDE DR. (MRS.) NANDINI. K. JOG ELECTRICAL ENGINEERING DEPARTMENT V.J. TECHNOLOGICAL INSTITUTE UNIVERSITY OF BOMBAY 2000-2001 1 VOICE OVER IP A Project Report submitted to the University of Bombay (Mumbai) in partial fulfillment of the requirements for the degree of Bachelor of Engineering (Electrical) By NAME ROLL.NO. UNIV.NO. SIGN. ANSHUL KUNDAJE GH-97729 GEETALI BHATIA GH-97705 MANGESH DALVI GH-97712 MEGHNA HARIDAS GH-97732 SUMERU NANDI GH-97736 Under the guidance of Dr. (Mrs.) Nandini. K. Jog Professor of Electronics Department of Electrical Engineering Veermata Jijabai Technological Institute Department of Electrical Engineering Veermata Jijabai Technological Institute Matunga, Mumbai 400 019 VEERMATA JIJABAI TECHNOLOGICAL INSTITUTE DEPARTMENT OF ELECTRICAL ENGINEERING 2 CERTIFICATE OF APPROVAL This is to certify that the dissertation titled “ VOICE OVER IP” is a bonafide record of dissertation work done by ANSHUL KUNDAJE GH-97729 GEETALI BHATIA GH-97705 MANGESH DALVI GH-97712 MEGHNA HARIDAS GH-97732 SUMERU NANDI GH-97736 Under the guidance of Dr. (Mrs.) N. K. Jog , Professor of Electronics, Department of Electrical Engineering; in partial fulfillment of the requirement for the degree of Bachelor of Engineering (Electrical) of the University of Bombay (Mumbai) Guide Principal Dr. (Mrs.) N. K. Jog Dr. S. D. Varwandkar 3 CERTIFICATE This is to certify that the project titled “ VOICE OVER IP” is a bonafide record of the project work done by ANSHUL KUNDAJE GH-97729 GEETALI BHATIA GH-97705 MANGESH DALVI GH-97712 MEGHNA HARIDAS GH-97732 SUMERU NANDI GH-97736 During the Academic Year 2000-2001 under the guidance of Dr.
    [Show full text]
  • Security in Voice Over Internet Protocol (Voip)
    Republic of Iraq Ministry of Higher Education and Scientific Research Al-Nahrain University College of Science Security in Voice over Internet Protocol (VoIP) A Thesis Submitted to the College of Science, Al-Nahrain University In Partial Fulfillment of the Requirements for The Degree of Master of Science in Computer Science By Kawthar Abed Al-Elah Abed Al-Rasul Mashkour (B.Sc. 2004) Supervisor Dr. Ban N. Al-Kallak April 2008 Rabi' Thani 1429 PDF created with pdfFactory Pro trial version www.pdffactory.com ِﺒﺴﻡ ِﭐ ﷲِ ﭐﻟﺭ ﺤ ﻤٰ ﻥ ِ ﭐﻟﺭ ﺤِﻴﻡ ِ (ﭐ ﻟﹾ ﺤﻤ ﺩ ﷲِ ﭐ ﻟﱠﺫِﻱ ﻫﺩٰﻨﹶﺎ ﻟِﻬٰﺫﹶﺍ ﻭﻤﺎ ﻜﹸﻨﱠﺎ ﻟِﻨﹶﻬ ﺘﹶﺩِ ﻯ ﻟﹶ ﻭ ﻵ ﺃَ ﻥ ﻫﺩٰﻨﹶﺎ ﭐ ﷲُ ) ﺼﺩﻕ ﺍﷲ ﺍﻟﻌﻅﻴﻡ ﺍﻻﻋﺭﺍﻑ (43) PDF created with pdfFactory Pro trial version www.pdffactory.com I Dedication I would like to dedicate this work to the member of my beloved family and all those who supported me in finishing this thesis. Kawthar II Acknowledgement First, I would like to thank God, for all the blessings that have given us. Second, I would like to express my sincere gratitude and appreciation to my supervisor Dr. Ban N. Al-Kallak for her valuable guidance, supervision and untiring efforts during the course of this work. Grateful thanks for the Head of Department of Computer Science Dr. Taha S. Bashaga, all staff and employees. Finally, my very special thanks to my family, my friends for their encouragement during the period of my studies. III Abstract In today’s environment nearly all end-to-end telephone connections are set up via circuit-switching using Public Switched Telephone Network (PSTN), whereby node-to-node links in an origin/destination connection are set up via interconnects, and the connection is maintained exclusively for exchanges of information between the origin and destination until it is torn down.
    [Show full text]
  • Packet Speech on the Arpanet: a History of Early LPC Speech and Its Accidental Impact on the Internet Protocol Robert M
    Research Triangle Park 11 June 2007 Packet speech on the Arpanet: A history of early LPC speech and its accidental impact on the Internet Protocol Robert M. Gray Information Systems Laboratory, Department of Electrical Engineering Stanford, CA 94305 The author’s work in speech was partially supported by the National Science Foundation. Thanks to J. D. Markel, A.H. “Steen” Gray, Jr., John Burg, Charlie Davis, Mike McCammon, Danny Cohen, Steve Casner, Richard Wiggins, Vishu Viswanathan, Jim Murphy, Cliff Weinstein, Joseph P. Campbell, Randy Cole, Rich Dean, Vint Cerf, and Bob Kahn. http://ee.stanford.edu/ gray/lpcip.html http://ee.stanford.edu/ gray/dl.html LPC & IP 1 Origins of this talk Special Workshop in Maui (SWIM), 12 January 2004 LPC & IP 2 Part I: Linear Prediction & Speech Observe data sequence {X0,X1,...,Xm−1}. Guess Xm Optimal 1-step prediction ¿ What is the optimal predictor of the form X˜m = p(X0,...,Xm−1)? Optimal 1-step linear prediction ¿ What is the optimal linear ˜ Pm predictor of the form Xm = − l=1 alXm−l ? Modeling/density estimation ¿ What is the probability density function (pdf) that “best” models Xm? Spectrum Estimation ¿ What is the “best” estimate of the power spectral density or covariance of the underyling random process? LPC & IP 3 The Application Speech Coding ¿ How apply linear prediction to produce low bit rate speech of sufficient quality for speech understanding and speaker recognition? E.g., reproducing waveform (waveform coding) or use model to synthesize (voice coding). Wide literature exists on all of these topics in a speech context and they are intimately related.
    [Show full text]