Professional Documents
Culture Documents
technologies
Voice over IP introduction
VoIP = Voice + IP
VOICE
Traditionally, voice was transmitted
using a separate dedicated
infrastructure and it is still in place i.e.
PSTN
The first network that was put in place
LAN ISDN
TRUNK
PSTN
PBX Extensions
Satellite Quality
High Quality Fax Relay, Broadcast
Time (msec)
Delay Target
Queuing Delay
In an unmanaged , Congested network
queuing delay can add up to two seconds of delay.
It can result in the packet being dropped.
This lengthy period of delay is unacceptable in
almost any network.
Queuing delay is only one component of end-
to-end delay.
Delay Variation—“Jitter”
Jitter is the variation of packet
inter arrival time
Delay Variation—“Jitter”
Sender Receiver
Network
A B C Sender Transmits
A B C Sink Receives
D1 D2 = D1 D3 = D2 t
Voice Compression
Two Basic variations of 64 Kbps PCM are
commonly used.
µ -law (North American)
A-law (Europe)
In both variations methods are similar
Both use logarithmic compression to achieve 12
to 13 bits of linear PCM quality in 8 bits.
µ-law has a slight advantage in low-level,
signal-to-noise ratio performance.
Important to note when making a long distance
call
Any required µ-law to a-law conversion is the
responsibility of the µ-law country.
Voice Compression
Another compression method used is Adaptive
differential pulse code modulation (ADPCM)
Commonly used interface of ADPCM is ITU-T G.726
This interface encodes using 4-bit samples
Transmission rate is 32 Kbps
Unlike PCM , 4 bit do not directly encode the amplitude of speech
, but they do encode the differences in amplitude , as well as the
rate of change of that amplitude
These techniques can be grouped together as source
code
It can also include variations such as
linear predictive coding (LPC)
Code excited linear prediction compression (CELP)
G.711
The most common codec
Used in circuit-switched telephone network
PCM, Pulse-Code Modulation
Uniform quantization (not done)
12 bits * 8 k/sec = 96 kbps
Non-uniform quantization
64 kbps DS0 rate
mu-law
North America & Japan
A-law
Other countries, including Pakistan
A MOS (Mean Opinion Score) of about 4.1
DPCM (Differential Pulse Code
Modulation)
No prediction
ADPCM (Adaptive Differential Pulse Code
Modulation)
Cake
A/D Code DSP Packet Recipe $0.32
10.1.1.1
16-Bit
Linear PCM Code
Look-Up
DSP = Digital
Signal Ingredients: Directions:
A-sound
Processing K-sound
Play K, A,
and K
1110010010010110
Waveform Waveform
ENCODER DECODER
Vocoders
PCM PCM
Encoder Decoder
Quantizing
Encoding
Sampling
Filtering
111001001001011
Sample
Frames
VocalCords
Parameters
Parameters
Throat
Mouth
Model
Model
Nose
10110010
Parameters
Human
Speech Model
Analysis Synthesis
End Office Switch Call-Flow
Versus IP Phone Call
1. Bob picks up his handset ( off hook).
2. The local end office switch gives Bob a dial tone.
3. Bob dials Judy’s seven-digit phone number.
4. The end office switch collects and analyzes the seven-digit number to
determine the destination of the phone call. The end office switch knows
that someone from Bob’s house is placing the call because of the specific
port that it dedicated to Bob.
5. The switch analyzes the seven-digit called number to determine whether
the number is a local number that the switch can serve.
6. The switch determines Judy’s specific subscriber line.
7. The end office switch then signals Judy’s circuit by ringing Judy’s phone.
8. A voice path back to Bob is cut through so that Bob can hear the ring-
back tone the end office switch is sending. The ring-back tone is sent to
Bob so that he knows Judy’s phone is ringing. (The ringing of Judy’s phone
and the ring-back tone that Bob hears need not be synchronized.)
9. Judy picks up her phone ( off hook).
End Office Switch Call-Flow
Versus IP Phone Call
End Office Switch
4 5 64
And 10
1 7
3 9
2
8
Bob Judy
End Office Switch Call-Flow
Versus IP Phone Call
1. Judy launches her Internet phone (I-phone) application , which is H.323-
compatible.
2. Bob already has hit I-phone application launched.
3. Judy knows that Bob’s Internet “name” or Domain Name System (DNS) entry,
is Bob.nextdoorneighbor.com , so she puts that into the “who to call” section
in her I-phone application and presses Return.
4. The I-phone application converts Bob.nextdoorneighbor.com to a DNS host
name and goes to a DNS server that is statically configured in Judy’s machine
to resolve the DNS name and get an actual IP address.
5. The DNS machine passes back Bob’s IP address.
6. Judy’s I-phone application takes Bob’s IP address and sends an H.225
message to Bob.
7. The H.225 message signals Bob’s PC to begin ringing.
8. Bob clicks on the Accept button, which tells his I-phone application to send
back an H.225 connect message.
9. Judy’s I-phone application then begins H.245 negotiation with Bob’s PC.
10. H.245 negotiation finishes and logical channels are opened. Bob and Judy can
now speak to one another through a packet-based network.
Calling with an internet-
phone application
Domain Name Server
4 5
6
1 and 3 2, 7 and 8
9
10
Judy Bob