An In-Depth Analysis
Delay/Latency.
Jitter.
Digital Sampling.
Voice Compression.
Echo.
Packet Loss.
Voice Activity Detection.
Digital-to-Analog Conversion.
Tandem Encoding.
Transport Protocols.
Dial-Plan Design.
Delay/Latency
The amount of time it takes for
speech to exit the speaker’s mouth
and reach the listener’s ear.
Three types of delay
Propagation Delay.
Serialization Delay.
Handling Delay.
Propagation Delay
It is caused by the speed of light in
fiber or copper-based networks.
Almost in perceptible to the human
ear
Propagation delay in conjunction
with handling delay can cause
noticeable speech degradation
Handling Delay
Its also called processing delay.
It defines many different causes of
delay.
Actual packetization
Compression
Packet switching
Handling Delay
In VoIP product, the DSP generates a speech
sample every 10ms when using 4.729
Two of these speech samples are then placed
within one packet
The packet delay is, therefore 20ms
Initial look-ahead of 5msec occur using G.729,
giving total delay 25ms
Cisco gave DSP much of the responsibilities for
framing and forming packets to keep much
overhead low.
RTP header is placed on the frame in DSP
instead of giving router that task
Serialization Delay
It is the amount of time it takes to
actually place a bit or byte on to
an interface.
Queuing Delay
When packets are held in a queue because of congestion on an
outbound interface , the result is queuing delay.
Queuing delay occurs when more packets are sent out than the
interface can handle at a given interval.
(ITU-T) G.114 recommendation specifies that for good voice
quality, no more than 150 ms of one-way , end-to-end delay
should occur.
Two routers with minimal network delay (back to back) use only
about 60 ms of end-to-end delay.
This leaves up to 90 ms of network delay to move the IP packet
from source to destination.
In satellite transmission , it takes approximately 250 ms for a
transmission to reach the satellite
And it takes approximately another 250 ms for it to come back
down to earth.
This result in a total delay of 500 ms
Queuing Delay
Satellite Quality
High Quality Fax Relay, Broadcast
Time (msec)
Delay Target
Queuing Delay
In an unmanaged , Congested network
queuing delay can add up to two seconds of delay.
It can result in the packet being dropped.
This lengthy period of delay is unacceptable in
almost any network.
Queuing delay is only one component of end-
to-end delay.
Delay Variation—“Jitter”
Jitter is the variation of packet
inter arrival time
Delay Variation—“Jitter”
Sender Receiver
Network
A B C Sender Transmits
A B C Sink Receives
D1 D2 = D1 D3 = D2 t
Voice Compression
Two Basic variations of 64 Kbps PCM are
commonly used.
µ -law (North American)
A-law (Europe)
In both variations methods are similar
Both use logarithmic compression to achieve 12
to 13 bits of linear PCM quality in 8 bits.
µ-law has a slight advantage in low-level,
signal-to-noise ratio performance.
Important to note when making a long distance
call
Any required µ-law to a-law conversion is the
responsibility of the µ-law country.
Voice Compression
Another compression method used is Adaptive
differential pulse code modulation (ADPCM)
Commonly used interface of ADPCM is ITU-T G.726
This interface encodes using 4-bit samples
Transmission rate is 32 Kbps
Unlike PCM , 4 bit do not directly encode the amplitude of speech
, but they do encode the differences in amplitude , as well as the
rate of change of that amplitude
These techniques can be grouped together as source
code
It can also include variations such as
linear predictive coding (LPC)
Code excited linear prediction compression (CELP)
G.711
The most common codec
Used in circuit-switched telephone network
PCM, Pulse-Code Modulation
Uniform quantization (not done)
12 bits * 8 k/sec = 96 kbps
Non-uniform quantization
64 kbps DS0 rate
mu-law
North America & Japan
A-law
Other countries, including Pakistan
A MOS (Mean Opinion Score) of about 4.1
DPCM (Differential Pulse Code
Modulation)
No prediction
ADPCM (Adaptive Differential Pulse Code
Modulation)
Cake
A/D Code DSP Packet Recipe $0.32
10.1.1.1
16-Bit
Linear PCM Code
Look-Up
DSP = Digital
Signal Ingredients: Directions:
A-sound
Processing K-sound
Play K, A,
and K
1110010010010110
Waveform Waveform
ENCODER DECODER
Vocoders
PCM PCM
Encoder Decoder
Quantizing
Encoding
Sampling
Filtering
111001001001011
Sample
Frames
VocalCords
Parameters
Parameters
Throat
Mouth
Model
Model
Nose
10110010
Parameters
Human
Speech Model
Analysis Synthesis
End Office Switch Call-Flow
Versus IP Phone Call
1. Bob picks up his handset ( off hook).
2. The local end office switch gives Bob a dial tone.
3. Bob dials Judy’s seven-digit phone number.
4. The end office switch collects and analyzes the seven-digit number to
determine the destination of the phone call. The end office switch knows
that someone from Bob’s house is placing the call because of the specific
port that it dedicated to Bob.
5. The switch analyzes the seven-digit called number to determine whether
the number is a local number that the switch can serve.
6. The switch determines Judy’s specific subscriber line.
7. The end office switch then signals Judy’s circuit by ringing Judy’s phone.
8. A voice path back to Bob is cut through so that Bob can hear the ring-
back tone the end office switch is sending. The ring-back tone is sent to
Bob so that he knows Judy’s phone is ringing. (The ringing of Judy’s phone
and the ring-back tone that Bob hears need not be synchronized.)
9. Judy picks up her phone ( off hook).
End Office Switch Call-Flow
Versus IP Phone Call
End Office Switch
4 5 64
And 10
1 7
3 9
2
8
Bob Judy
End Office Switch Call-Flow
Versus IP Phone Call
1. Judy launches her Internet phone (I-phone) application , which is H.323-
compatible.
2. Bob already has hit I-phone application launched.
3. Judy knows that Bob’s Internet “name” or Domain Name System (DNS) entry,
is Bob.nextdoorneighbor.com , so she puts that into the “who to call” section
in her I-phone application and presses Return.
4. The I-phone application converts Bob.nextdoorneighbor.com to a DNS host
name and goes to a DNS server that is statically configured in Judy’s machine
to resolve the DNS name and get an actual IP address.
5. The DNS machine passes back Bob’s IP address.
6. Judy’s I-phone application takes Bob’s IP address and sends an H.225
message to Bob.
7. The H.225 message signals Bob’s PC to begin ringing.
8. Bob clicks on the Accept button, which tells his I-phone application to send
back an H.225 connect message.
9. Judy’s I-phone application then begins H.245 negotiation with Bob’s PC.
10. H.245 negotiation finishes and logical channels are opened. Bob and Judy can
now speak to one another through a packet-based network.
Calling with an internet-
phone application
Domain Name Server
4 5
6
1 and 3 2, 7 and 8
9
10
Judy Bob