A Review of Network Server Based Distributed Speech Recognition
|
|
- Neil Ramsey
- 5 years ago
- Views:
Transcription
1 A Review of Network Based Distributed Speech Recognition YIMIN XIE, JOE CHICHARO, JIANGTAO XI & CHUN TUNG CHOU School of Electrical, Computer and Telecommunications ering University of Wollongong Northfields Avenue, Wollongong NSW 2522, AUSTRALIA Abstract: - Speech is the most natural means for people to communicate with each other. It is also regarded as the preferred method of future interaction between people and computer devices and applications in general. Distributed speech recognition technology facilitates the extension towards mobile devices by increasing their functionality and ease of use. This paper reviews the key aspects of distributed speech recognition technology and discusses some of the associated applications and technical challenges. A feasibility study is undertaken to establish the likely performance of a network server based speech recognition system. The objective is to provide speech recognition for users of mobile devices such as the Smartbadge [1]. Preliminary simulation results for the proposed system are presented which suggest that a single speech recognition engine can support a multi-user speech recognition system and still achieve a response time similar to a single user system. Key-Words: - Distributed speech recognition, Speech recognition front-end, based speech recognition. 1. Introduction Speech is the ultimate, ubiquitous interface. The ability to enter information or to control a process using one's voice offers real operational benefit to a wide range of users. Research on speech recognition has a long history, with the first work in this area dating back to the 1870s [2]. There have been substantial improvements in the capabilities of automatic speech recognition algorithms and products in the past few years, with more than 60 current vendors supplying a wide range of commercial speech recognition products world-wide [3]. In quiet office environments, the accuracy rate of most these recognition systems is reported to around 94% or higher with a vocabulary size of up to 20,000 words [4]. Speech recognition technology is being used in many applications, such as telephone call automation, network-based voice messaging, automatic transaction processing, timetable and directory enquiries and dictation [2, 5]. Telephone based Interactive Voice Response (IVR) system such as BT's Brimstone corporate telephone directory has been implemented and used in areas such as call control, voice mail and simple information retrieval [6, 7]. The use of voice-control interfaces to access information and services is becoming increasingly widespread and moving towards Internet-based services as speech recognition technology matures. Increasingly, people want the ability to access information while on the move. This demand will shift the use of speech for access to information and services from the wire line world to mobile wireless world. In this case a small portable device such as Personal Digital Assistant (PDA) or mobile phone is used to access data services through the natural user interface such as speech. Even though many on-chip speech recognition systems have been integrated into some command and control applications such as entertainment control, self-dialing cellular phones and even robot pet toys, the vocabulary of these systems is limited. Large vocabulary speech recognition systems require fast computation and large memory capacity to be able to work effectively and smoothly. These requirements are far beyond the capacity of most mobile devices and handheld computers. Distributed speech recognition is considered a desirable solution for providing a natural interface between users and mobile devices. Distributed speech recognition technology enables a new generation of interactive voice response applications operating over the mobile telephone and IP network. A growing number of e- businesses are targeting this vast market by deploying voice portal technologies that enable consumer access to web site content and transaction from the telephone. Voice access to web content and services provides a great opportunity to offer a wide
2 variety of services not only to users with computers but also to anyone with a telephone or a mobile phone or even a simpler mobile device such as a Smartbadge. 2. Distributed Speech Recognition A signal processing front-end is a common component of all speech recognition system [8], which extracts a set of acoustic features from the sampled speech. These feature vectors are then passed to a speech recognition engine where the utterances are recognized. The functional block diagram of a distributed speech recognition (DSR) system is illustrated in Figure 1. In this case the signal processing front-end is moved into the mobile device. This device is connected to a network server, or in case of multi-language system, to a bank of network servers, or a number of distributed servers through the data network. The speech recognition engines are located in the network servers. Hence users of mobile devices will feel as if the speech recognition system is on their mobile device. Signal Processing Front-end (Mobile Device) Data Network Back-End Recognizer (Network ) Back-End Recognizer (Network ) Back-End Recognizer (Network ) Fig. 1. Distributed speech recognition Moving the front-end processing of speech recognition system to the mobile device enables the speech features to be packeted into a stream of feature vectors, which can be transmitted to the network server where the actual speech recognition takes place. There are two common methods for computing acoustic features for signal processing front-end: a Filter-bank model and a Linear Predictive Coding (LPC) model. The choice of which method to use is based on the type of implementation, computational resources and memory available on the device. To support distributed speech recognition and other related applications and services, a standard for the distributed speech recognition front-end is being recommended and developed to ensure compatibility and interoperability. In particular, the Aurora DSR working group within the European Telecommunications Standards Institute (ETSI) has been actively developing this standard for the cellular phone. The recommended front-end system is illustrated by a simplified block diagram shown in Figure 2. Input Speech Feature Extraction Feature Compression Transmission Channel Bit Stream Formatting Fig. 2. Distributed speech recognition front-end The feature extraction algorithm used is a Mel- Cepstrum algorithm [9], which computes a set of feature vectors from the sampled speech. Each short-time analysis frame consists of 13 static cepstral coefficients and a log-energy coefficient. These feature vectors are then passed to a feature compression function in order to reduce the amount of data needed to represent the extracted feature vectors. The algorithm used in the feature compression is a split Vector Quantisation (VQ), which groups the static Mel Cepstral coefficients into pairs. Each pair of coefficients is then quantized using its own codebook (with a typical size of 64). The codebook indices are used as feature vector representations for each speech frame. The bit stream formatting function creates packets of compressed speech feature vectors together with error protection code in a fixed length message (144 bytes), which can be transmitted to the recognizer in the central server [9]. The advantages of this approach are that it can eliminate channel transmission errors, maintain the overall recognition performance and enable easy update of technologies and services provided. 3. Distributed Speech Recognition Across Internet The use of distributed speech recognition technology in Internet based services is a promising means of providing robust speech interface for people to interact with computer devices, especially in the mobile world and is one important step towards ubiquitous computing. It facilitates the implementation of distributed speech recognition
3 technology over an IP network and enables the use of existing network infrastructure and services. However, there are a number of advantages and disadvantages for deploying distributed speech recognition over an IP network. 3.1 Advantages 1. Sending the compressed speech feature vectors gives a useful increase in performance as well as a reduction of overall computational costs, when it is compared with directly sending speech in the form of codec parameters [10, 11, 12]. For example, coded speech using GSM encoding at 13kb/s gives a word error rate of 14.5% while VQ based compressed speech feature vectors at 2kb/s gives a word error rate of 6.63% [12]. This lower bit rate is of great benefit to handhold mobile devices such as wireless PDA. 2. Distributed network engine servers can share the computational resources between end users and enable the easy update of technologies and services provided. In other words, users can take advantage of the latest speech recognition engine and frequently updated vocabulary with out the massy upgrade of their own systems. 3. Increases the functionality and ease of use and hence creates greater end user opportunities and demand for new services. For example, providing directory service for location aware handhold mobile devices while users are on the move or driving a vehicle. 3.2 Disadvantages 1. The connectionless IP protocol is not particularly well suited for transmitting realtime data as there is not yet guaranteed Quality of Services (QoS) through the entire network. Therefore, as traffic in the network increases the transfer of data slows down and may make the service unusable. 2. Buffering large amounts of speech feature vectors for compression and transmission causes delays in the system. 3. The short battery life and limited processing power inherent in mobile devices results in a trade-off between complexity and reliability. 3.3 Challenges Distributed speech recognition has been tested with the packet-based Internet Protocol and Voice over IP (VoIP) [10]. The results indicated that the commonly used Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) for distributed speech recognition faces number of challenges (such as packet loss, packet efficiency and delay). 1. The TCP protocol will deliver every packet but not in a specific time while UDP protocol allows smaller delays in packet delivery time but at the expense of probable loss in some of the speech feature vectors when network traffic is high. The degradation in speech recognition performance will be significant if the packet loss is high [10]. This calls for the design of more sophisticated packet loss recover technique if multiple speech frames are compressed and sent within a single packet. 2. The recommended standard [9] for distributed speech recognition packets multiframes of speech feature vectors into a fixed length message (144 Bytes), which represents 240ms of speech. It will introduce a large processing delay if this multi-frame of speech feature vectors is sent one at a time. Reducing the frame size can reduce the latency introduced by the frontend processing, but the packet efficiency will be lower. Therefore, there is a trade-off between front-end processing delay and packet efficiency. In addition, to facilitate the implementation of distributed speech recognition over an IP Network and offer low cost voice interactive response services to the end user, one of the issues need to be addressed is: What are the scalability constraints associated with distributed speech recognition? 4. Proposed System Speech recognition engines are system resource intensive and it is not acceptable (in terms of efficiency) to have a one to one ratio between users and speech recognition engines. This paper seeks to answer the question of the optimal number of users per speech recognition engine for a given system resource. Recent advances in speech recognition technology, particularly improvements in the accuracy of large vocabulary speech recognition and increases in available bandwidth to the desktop or wireless terminals enable us to consider a network server based speech recognition system. The proposed system aims to provide speech recognition services for multiple users of a mobile device such as Smartbadge on a local network.
4 The system as shown in Figure 3 consists of the following components: Front-End Terminal, Speech Agent and a band of Speech Recognition s. Mobile Device (Front-end Terminal) Mobile Device (Front-end Terminal)... Mobile Device (Front-end Terminal) Back-end Speech Recognition.... Speech Agent Back-end Speech Recognition Fig. 3. Network server-based DSR system Front-end Terminal: The front-end terminal can be a fixed terminal or a wireless mobile device or appliance running a small user agent program on behalf of an application. The user agent program is responsible for capturing and transmitting the parameterized feature vectors of the speech to the Speech Agent and passing back the decode text to the application. It only encapsulates and transmits the speech feature vectors when an utterance is detected via speech detection techniques. Speech Agent: The speech server agent consists of a multi threaded server agent program, which is supported by single or multiple back-end speech recognition engines. Also, the server agent is responsible for admission control and workload balancing if it is supported by multiple engines. agent running on a network server responds to the user agents and creates a new thread for each new user and accepts data from the user agent upon receipt of service requests. When the end of utterance signal is received, the server agent places the entire speech data into a task queue. The task queue handler will allocate the task to the first available speech recognition engine. The speech recognition engine responds to it by returning the decoded text. The server agent either sends back the decoded text to the user agent or performs further operations depending on the services provided. If a voice response is preferred, the Text To Speech (TTS) technique is employed to convert the decoded text to speech, and the speech is then sent to the user. Speech Recognition s: There are a number of different configurations for the back-end speech recognition engines. These engines can be organized physically to reside on multiple machines, i.e. a cluster system. They can also be built on one or more high performance machines which employ symmetric multiprocessor architecture. Remark: Although the proposed system has one speech server agent which organizes all the incoming requests, this system can be extended to include a number of geographically distributed agents and engines over the network to enhance the scalability and reliability of the entire system. The latter configuration can improve the response time if the customers are dispersed over a large area. 5. Preliminary Simulation Results From the user s point of view, response time is one of the most important performance characteristics. Response time is defined as the time between the end of spoken command and the system response (i.e. replies with decoded text). This experiment was conducted on a 550 MHz Pentium III machine with 128MB RAM and used the IBM ViaVoice speech recognition engine. The distributed speech recognition system was implemented as a TCP/IP client/server pair. The grammar file used was the Kiosk Example [13], which contains 2664 possible sentences or commands. The lengths of these sentences varied from 0.5 second to 6 seconds. Two hundred sentences were randomly selected and used to analyze the distribution of their length and processing time for a given system resource. The simulation analyzed the response time for one or more terminals connected to the system and examined the worst case (user issued commands one after another as soon as he or she received the response). In order to simulate the system, data was collected from a performance analysis of a user connected to a speech server agent with a single speech recognition engine. This data was then analyzed to estimate the performance of more than one terminal communicating to a network speech recognition engine through speech server agent. The simulation results are shown in Figures 4 to 6.
5 Fig. 4. Response time for a network server-based speech recognition system Fig. 5. Distribution of response time for a system which supports 10 users simultaneously. Fig. 6. Distribution of response time for a system which supports 15 users simultaneously. In order for a system to be practical, we assumed that the delay for front-end processing is less than 250ms and transfer delay is less than 200ms each way [9, 10, 14]. Also, the overall response time must be less than 2 seconds, as any longer delay may cause concern and lead to user frustration, especially in an application where speech is the only interface. For the given system resources (550 MHz Pentium III CPU with 128MB RAM) the processing time for each spoken command was found to be slightly less than one tenth of the length of the individual command. Our results show that ten users can be supported simultaneously within a 2 second limit 99% of the time (see figure 5) and 15 users can be supported 95% of the time (see figure 6). Although this result is system resource dependent, it indicates that more than ten users can be connected to a network server with a single speech recognition engine and still achieve a reasonable average response time similar to a single user system. If the number of concurrent users increases from 15 to 20 the average response time will increase significantly and the speech engine will be saturated. Note that the above analysis considers the worst case scenario, the speech server will be able to support more users if we take statistical multiplexing into account. 6. Conclusions and Future Work Distributed speech recognition technology enables a new generation of interactive voice response applications operating over the mobile telephone and IP network and makes use of the existing network infrastructure and services. Utilizing VQ based compressed speech feature vectors gives a useful increase in the performance as well as a reduction of overall computational costs. However, a more sophisticated packet loss recover technique is required if the UDP protocol is considered. Also there is a trade-off between front-end processing delay and packet efficiency. We proposed a network server-based architecture for delivering speech recognition services. This architecture can offer more cost/performance service to voice interactive applications for a small office environment and allows easy update of the new technologies. Also its capacity can be extended by adding more engines into a cluster server system to enhance the scalability and reliability of the speech network server. The ongoing experiment will examine the feasibility of providing multi-language speech recognition service over a wide area network and focus on the workload balancing on the multiple DSR engine server, the scalability of the distributed speech recognition network server and its applications. References: [1] P. Beadle et al. Location Aware Mobile Computing In ICT97, April 1997.
6 [2] J. A. Markowitz. Using speech Recognition, Prentice Hall, [3] R. K. Moore. Dictation and Voice Control: automatic speech recognition in the marketplace. In Speech and Language ering - State of the Art, page(s) 7/1-7/4, [4] P. Woodland. Speech Recognition In Speech and Language ering State of the Art, Volume 9. No.5, page(s) 2/1-2/5, Oct [5] F. A. Westall. Review of speech recognition for telecommunications. In Electronics and Communication ering, Volume 9 page(s) , Oct [6] D. J. Attwater and S. J. Whittaker. The Brimstone Corporate Directory Enquiries Application. In Advances in Interactive Voice Technologies for Telecommunication services, page(s) 5/1-5/8, [7] S. J. Whittaker and D. J. Attwater. The designed of complex telephony applications using large vocabulary speech technology In Spoken Language ICSLP 96, volume 2, page(s) , [8] L. Rabiner and B. H. Jaung. Fundamentals of Speech Recognition, Prentice Hall, [9] ETSI Draft ES V1.1.1 Distributed Speech Recognition; Front-end Feature Extraction Algorithm; Compression Algorithm, Feb [10] B. Milner et al. Robust Distributed Speech Recognition across IP Network. In Interactive Spoken Dialogue Systems for Telephony Applications, page(s) 6/1-6/6, [11] D. B. Roe and J. G. Wilpon. Whither speech recognition: the next 25 years: In IEEE communications Magazine, volume 31, Nov, [12] V. V. Digalakis, L. G. Neumeyer and M. Perakakis, Quantization of Cepstral Parameters for Speech Recognition over the World Wide Web, In IEEE Journal on Volume 17, Issue 1, Page(s): 82 90, [13] SMAPI Developer s Guide, IBM ViaVoice SDK for Windows Version 1.5, IBM, second edition, January URL: [14] S. Ramanathan and P. V. Rangan. Architectures for Personalized Multimedia In IEEE Multimedia, volume 1, page(s) 37-46, 1994.
COPYRIGHTED MATERIAL. Introduction. 1.1 Introduction
1 Introduction 1.1 Introduction One of the most fascinating characteristics of humans is their capability to communicate ideas by means of speech. This capability is undoubtedly one of the facts that has
More informationABSTRACT. that it avoids the tolls charged by ordinary telephone service
ABSTRACT VoIP (voice over IP - that is, voice delivered using the Internet Protocol) is a term used in IP telephony for a set of facilities for managing the delivery of voice information using the Internet
More informationNetwork Systems for Emerging WAN Applications
Network Systems for Emerging WAN Applications Hitachi Review Vol. 48 (1999), No. 4 169 Akihiko Takase, D.Sc. OVERVIEW: This paper describes wide-area-network architecture from the viewpoints of networking
More informationWIRELESS LANs: THE DECT APPROACH
WIRELESS LANs: THE DECT APPROACH Anthony Lo Centre for Wireless Communications National University of Singapore 20 Science Park Road #02-34/37 TeleTech Park Singapore Science Park II Singapore 117674 Email:
More information4.0.1 CHAPTER INTRODUCTION
4.0.1 CHAPTER INTRODUCTION Data networks and the Internet support the human network by supplying seamless, reliable communication between people - both locally and around the globe. On a single device,
More informationNetwork Extension Unit (NXU)
Network Extension Unit (NXU) Purpose--Bandwidth Capabilities The purpose of the application note is to provide a description of the NXU bandwidth. The details will cover the following: General description
More informationIntroduction to TCP/IP Offload Engine (TOE)
Introduction to TCP/IP Offload Engine (TOE) Version 1.0, April 2002 Authored By: Eric Yeh, Hewlett Packard Herman Chao, QLogic Corp. Venu Mannem, Adaptec, Inc. Joe Gervais, Alacritech Bradley Booth, Intel
More informationDELIVERING MULTIMEDIA CONTENT FOR THE FUTURE GENERATION MOBILE NETWORKS
Research Article DELIVERING MULTIMEDIA CONTENT FOR THE FUTURE GENERATION MOBILE NETWORKS S. Swarna Parvathi, Dr. K. S. Eswarakumar Address for Correspondence S. Swarna Parvathi, PhD Scholar Department
More informationOverview of Java 2 Platform, Micro Edition (J2ME )
CHAPTER2 Overview of Java 2 Platform, Micro Edition (J2ME ) 2.1 Java 2 Platform Recognizing that one size does not fit all, Sun Microsystems has grouped Java technologies into three editions, each aimed
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More information[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions
[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open
More informationSynopsis of Basic VoIP Concepts
APPENDIX B The Catalyst 4224 Access Gateway Switch (Catalyst 4224) provides Voice over IP (VoIP) gateway applications for a micro branch office. This chapter introduces some basic VoIP concepts. This chapter
More informationMeasuring MPLS overhead
Measuring MPLS overhead A. Pescapè +*, S. P. Romano +, M. Esposito +*, S. Avallone +, G. Ventre +* * ITEM - Laboratorio Nazionale CINI per l Informatica e la Telematica Multimediali Via Diocleziano, 328
More informationLocation Based Advanced Phone Dialer. A mobile client solution to perform voice calls over internet protocol. Jorge Duda de Matos
Location Based Advanced Phone Dialer A mobile client solution to perform voice calls over internet protocol Jorge Duda de Matos Superior Institute of Technology (IST) Lisbon, Portugal Abstract Mobile communication
More informationMultiDSLA. Measuring Network Performance. Malden Electronics Ltd
MultiDSLA Measuring Network Performance Malden Electronics Ltd The Business Case for Network Performance Measurement MultiDSLA is a highly scalable solution for the measurement of network speech transmission
More information14th European Signal Processing Conference (EUSIPCO 2006), Florence, Italy, September 4-8, 2006, copyright by EURASIP
TRADEOFF BETWEEN COMPLEXITY AND MEMORY SIZE IN THE 3GPP ENHANCED PLUS DECODER: SPEED-CONSCIOUS AND MEMORY- CONSCIOUS DECODERS ON A 16-BIT FIXED-POINT DSP Osamu Shimada, Toshiyuki Nomura, Akihiko Sugiyama
More informationOSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1
OSI Transport Layer Network Fundamentals Chapter 4 Version 4.0 1 Transport Layer Role and Services Transport layer is responsible for overall end-to-end transfer of application data 2 Transport Layer Role
More informationChapter 10: Wireless Networking. School of information science and Engineering, SDU
Chapter 10: Wireless Networking School of information science and Engineering, SDU 10.1 Introduction to Wireless Networks Requirement to the networks: Provides ubiquitous personal communications; Accommodate
More informationA Plexos International Network Operating Technology May 2006
A Plexos International Network Operating Technology May 2006 BY 4664 Jamestown Ave, Suite 325 Baton Rouge, LA 70808 225.218.8002 1.0 Introduction. is a software environment comprised of proven technologies
More informationTroubleshooting Voice Over IP with WireShark
Hands-On Troubleshooting Voice Over IP with WireShark Course Description Voice over IP is being widely implemented both within companies and across the Internet. The key problems with IP voice services
More informationOSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,
ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure
More informationCloudamize Agents FAQ
Cloudamize Agents FAQ Cloudamize is a cloud infrastructure analytics platform that provides data analysis and recommendations to speed and simplify cloud migration and management. Our platform helps you
More informationBandwidth, Latency, and QoS for Core Components
Bandwidth, Latency, and QoS for Core Components, on page 1 Bandwidth, Latency, and QoS for Optional Cisco Components, on page 18 Bandwidth, Latency, and QoS for Optional Third-Party Components, on page
More informationIntroduction to Networks and the Internet
Introduction to Networks and the Internet CMPE 80N Announcements First quiz on Friday, 01.16. Covers material up to and including 01.14. Closed books, notes, etc. Winter 2004 Lecture 5 1 2 Data Transmission
More informationMultimedia Environment for Mobiles (MEMO) - Interactive Multimedia Services to Portable and Mobile Terminals
Multimedia Environment for Mobiles (MEMO) - Interactive Multimedia Services to Portable and Mobile Terminals Thomas Lauterbach* and Matthias Unbehaun Robert Bosch Multimedia-Systems GmbH & Co. KG, P.O.
More informationNetwork Design Considerations for Grid Computing
Network Design Considerations for Grid Computing Engineering Systems How Bandwidth, Latency, and Packet Size Impact Grid Job Performance by Erik Burrows, Engineering Systems Analyst, Principal, Broadcom
More informationPerformance of relational database management
Building a 3-D DRAM Architecture for Optimum Cost/Performance By Gene Bowles and Duke Lambert As systems increase in performance and power, magnetic disk storage speeds have lagged behind. But using solidstate
More informationLecture 2 Communication services The Trasport Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 2 Communication services The Trasport Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it The structure edge: applications and hosts core: routers of s access s, media:
More informationH.323. Definition. Overview. Topics
H.323 Definition H.323 is a standard that specifies the components, protocols and procedures that provide multimedia communication services real-time audio, video, and data communications over packet networks,
More informationWireless Access Protocol(WAP) architecture
Wireless Access Protocol(WAP) architecture While the evolution of cellular networks has resulted in many mobile services, such services are primarily for voice. Mobile phone users do have the desire to
More informationBlue3 A Programmable Remote MP3 Sensor
Blue3 A Programmable Remote MP3 Sensor Anonymous Anon Inc. Abstract. We present the concept and the prototypical implementation of Blue3, a programmable device that features a wireless communication interface,
More informationCHAPTER. Introduction. Last revised on: February 13, 2008
CHAPTER 1 Last revised on: February 13, 2008 The Cisco Unified Communications System delivers fully integrated communications by enabling data, voice, and video to be transmitted over a single network
More informationNetwork Working Group Request for Comments: 4060 Category: Standards Track May 2005
Network Working Group Request for Comments: 4060 Category: Standards Track Q. Xie D. Pearce Motorola May 2005 Status of This Memo RTP Payload Formats for European Telecommunications Standards Institute
More informationCh. 4 - WAN, Wide Area Networks
1 X.25 - access 2 X.25 - connection 3 X.25 - packet format 4 X.25 - pros and cons 5 Frame Relay 6 Frame Relay - access 7 Frame Relay - frame format 8 Frame Relay - addressing 9 Frame Relay - access rate
More informationCCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer
CCNA Exploration Network Fundamentals Chapter 04 OSI Transport Layer Updated: 05/05/2008 1 4.1 Roles of the Transport Layer 2 4.1 Roles of the Transport Layer The OSI Transport layer accept data from the
More informationIP Mobility vs. Session Mobility
IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms
More information6WINDGate. White Paper. Packet Processing Software for Wireless Infrastructure
Packet Processing Software for Wireless Infrastructure Last Update: v1.0 - January 2011 Performance Challenges for Wireless Networks As advanced services proliferate and video consumes an ever-increasing
More informationInternetworking Models The OSI Reference Model
Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)
More informationAn Approach for Enhanced Performance of Packet Transmission over Packet Switched Network
ISSN (e): 2250 3005 Volume, 06 Issue, 04 April 2016 International Journal of Computational Engineering Research (IJCER) An Approach for Enhanced Performance of Packet Transmission over Packet Switched
More informationSeven Criteria for a Sound Investment in WAN Optimization
Seven Criteria for a Sound Investment in WAN Optimization Introduction WAN optimization technology brings three important business benefits to IT organizations: Reduces branch office infrastructure costs
More informationA RLC/MAC PROTOCOL ARCHITECTURE FOR A WIRELESS IP NETWORK
A RLC/MAC PROTOCOL ARCHITECTURE FOR A WIRELESS IP NETWORK Jamil Y. Khan School of Electrical Engineering & Computer Science, University of Newcastle, Callaghan, NSW 238, Australia, jkhan@ecemail.newcastle.edu.au
More informationCHAPTER 03: MULTIMEDIA & OPERATING SYSTEM. :: Operating System :: ~ What is OS?~ ~ OS Functions~ ~ OS Characteristics ~ ~ Type of OS~
CHAPTER 03: MULTIMEDIA & OPERATING SYSTEM :: Operating System :: ~ What is OS?~ ~ OS Functions~ ~ OS Characteristics ~ ~ Type of OS~ 1 Operating System and Software Computer Operating System An operating
More informationMemory Systems IRAM. Principle of IRAM
Memory Systems 165 other devices of the module will be in the Standby state (which is the primary state of all RDRAM devices) or another state with low-power consumption. The RDRAM devices provide several
More informationVoice over Internet Protocol
Voice over Internet Protocol Voice over Internet Protocol Contents Introduction Benefits of Integrating Voice and Data Networks Converting Voice to Data Efficient and Reliable Network Infrastructures
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationSynthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE)
Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE) Problem Definition Solution Approach Benefits to End User Talk Overview Metrics Summary of Results to Date Lessons Learned & Future Work
More informationInfiniBand SDR, DDR, and QDR Technology Guide
White Paper InfiniBand SDR, DDR, and QDR Technology Guide The InfiniBand standard supports single, double, and quadruple data rate that enables an InfiniBand link to transmit more data. This paper discusses
More informationComputation of Multiple Node Disjoint Paths
Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes
More information2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)
2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing
More informationVoIP Basics. 2005, NETSETRA Corporation Ltd. All rights reserved.
VoIP Basics Phone Network Typical SS7 Network Architecture What is VoIP? (or IP Telephony) Voice over IP (VoIP) is the transmission of digitized telephone calls over a packet switched data network (like
More informationIP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
More informationMobile TeleSystems (MTS) Converges Fixed and Mobile Telephony
Mobile TeleSystems (MTS) Converges Fixed and Mobile Telephony MTS creates new revenue opportunities with new services. EXECUTIVE SUMMARY Mobile TeleSystems (MTS) Industry: Telecommunications BUSINESS CHALLENGE
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationMultimedia Applications over Packet Networks
Multimedia Networking and Quality of Service Mario Baldi Technical Univeristy of Torino Computer Engineering Department mario.baldi@polito.it +39 011 564 7067 staff.polito.it/mario.baldi Nota di Copyright
More informationAssignment 5. Georgia Koloniari
Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last
More informationAn Efficient VoIP System to Promote Voice Access Business
An Efficient VoIP System to Promote Voice Access Business Xicheng Liu Centre for Communication Systems Research University of Cambridge N.liu@ccsr.cam.ac.uk Timothy J. Li Motorola Electronics Co., Ltd.
More informationThe Frozen Mountain irtc White Paper Series
The Frozen Mountain irtc White Paper Series This white paper is the fourth in a series on Internet Based Real Time Communications (irtc) written by Frozen Mountain Software s CTO Anton Venema. The complete
More informationChapter 20: Multimedia Systems
Chapter 20: Multimedia Systems, Silberschatz, Galvin and Gagne 2009 Chapter 20: Multimedia Systems What is Multimedia? Compression Requirements of Multimedia Kernels CPU Scheduling Disk Scheduling Network
More informationChapter 20: Multimedia Systems. Operating System Concepts 8 th Edition,
Chapter 20: Multimedia Systems, Silberschatz, Galvin and Gagne 2009 Chapter 20: Multimedia Systems What is Multimedia? Compression Requirements of Multimedia Kernels CPU Scheduling Disk Scheduling Network
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Misc. Interested in research? Secure
More informationMARKETING REPORT. Application Layer Testing (ALT): The Key to Optimizing Quality of Experience MR-433
MARKETING REPORT Application Layer Testing (ALT): The Key to Optimizing Quality of Experience MR-433 The key to optimizing quality of experience Providing a unique value for a wide range of cenarios by
More informationDesign Considerations
Principal for Call Center Sizing, page 2 Preliminary Information Requirements, page 3 Terminology, page 4 Effect of Performance Criteria on Unified CCX Server, page 5 Impact of Performance Criteria on
More informationChapter 2. Literature Survey. 2.1 Remote access technologies
Chapter 2 Literature Survey This chapter presents a brief report on literature reviewed in context to present work with an aim to identify current state of research in the domain. Literature review is
More informationDigital Communication Networks
Digital Communication Networks MIT PROFESSIONAL INSTITUTE, 6.20s July 25-29, 2005 Professor Muriel Medard, MIT Professor, MIT Slide 1 Digital Communication Networks Introduction Slide 2 Course syllabus
More informationDesign Considerations
Principal for Call Center Sizing, page 2 Preliminary Information Requirements, page 3 Terminology, page 4 Effect of Performance Criteria on Unified CCX Server, page Impact of Performance Criteria on the
More informationMultimedia Networking and Quality of Service
Multimedia Networking and Quality of Service Mario Baldi Politecnico di Torino (Technical Univeristy of Torino) Department of Computer Engineering mario.baldi [at] polito.it +39 011 564 7067 staff.polito.it/mario.baldi
More informationIntroduction to Networking
Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI
More informationA loss-resistant method of seismic data transmission over wireless data networks
Seismic data transmission A loss-resistant method of seismic data transmission over wireless data networks Henry C. Bland ABSTRACT A recent continuous seismic monitoring effort employed a wireless network
More informationDISTRIBUTED HIGH-SPEED COMPUTING OF MULTIMEDIA DATA
DISTRIBUTED HIGH-SPEED COMPUTING OF MULTIMEDIA DATA M. GAUS, G. R. JOUBERT, O. KAO, S. RIEDEL AND S. STAPEL Technical University of Clausthal, Department of Computer Science Julius-Albert-Str. 4, 38678
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g
More informationVoIP INTERNET-BASED PHONE SYSTEMS CHOCK FULL OF FEATURES
VoIP INTERNET-BASED PHONE SYSTEMS CHOCK FULL OF FEATURES VoIP Internet-based phone systems chock full of features TABLE OF CONTENTS What is VoIP? Switching to VoIP is easy Business Telecom Features Improved
More informationDiffServ Architecture: Impact of scheduling on QoS
DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics
More informationPerspectives on Multimedia Quality Prediction Methodologies for Advanced Mobile and IP-based Telephony
Perspectives on Multimedia Quality Prediction Methodologies for Advanced Mobile and IP-based Telephony Nobuhiko Kitawaki University of Tsukuba 1-1-1, Tennoudai, Tsukuba-shi, 305-8573 Japan. E-mail: kitawaki@cs.tsukuba.ac.jp
More informationIPv6-based Beyond-3G Networking
IPv6-based Beyond-3G Networking Motorola Labs Abstract This paper highlights the technical issues in IPv6-based Beyond-3G networking as a means to enable a seamless mobile Internet beyond simply wireless
More informationWhitePaper: XipLink Real-Time Optimizations
WhitePaper: XipLink Real-Time Optimizations XipLink Real Time Optimizations Header Compression, Packet Coalescing and Packet Prioritization Overview XipLink Real Time ( XRT ) is an optimization capability
More informationVoice Analysis for Mobile Networks
White Paper VIAVI Solutions Voice Analysis for Mobile Networks Audio Quality Scoring Principals for Voice Quality of experience analysis for voice... 3 Correlating MOS ratings to network quality of service...
More informationAdvanced Mobile Computing and Networking - CS 560. Wireless Technologies. Bluetooth. Bluetooth. Bluetooth. Bluetooth 7/3/2014.
Advanced Mobile Computing and Networking - CS 560 Assessment CA 40% - Assignment 20% - 2 Tests 10% each Exam 60% Wireless Technologies, Infrared Data Association (),, and Institute of Electrical and Electronic
More informationQoS Targets for IP Networks & Services: Challenges and Opportunities
QoS Targets for IP Networks & Services: Challenges and Opportunities Dave Mustill Performance & QoS Standards BT Group Chief Technology Office Presentation Outline Speech quality in the PSTN and beyond
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.
113 Chapter 9 TCP/IP Transport and Application Layer Services that are located in the transport layer enable users to segment several upper-layer applications onto the same transport layer data stream.
More informationMultimedia Document Communications over Wireless Network
Multimedia Document Communications over Wireless Network 1 Convergence of Mobile Services Personal computer Access to any data Internet Telecommunications Mobile Technology Ubiquitous Portable processing
More informationComputer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the
Mobile IP (IPv4 and IPv6) Dr. John Keeney 3BA33 Elements of a wireless Wired infrastructure wireless hosts laptop, PDA, IP phone run applications may be stationary (nonmobile) or mobile wireless does not
More informationA MULTI-RATE SPEECH AND CHANNEL CODEC: A GSM AMR HALF-RATE CANDIDATE
A MULTI-RATE SPEECH AND CHANNEL CODEC: A GSM AMR HALF-RATE CANDIDATE S.Villette, M.Stefanovic, A.Kondoz Centre for Communication Systems Research University of Surrey, Guildford GU2 5XH, Surrey, United
More informationModule 2 Overview of Computer Networks
Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link:
More informationModule 2 Overview of. Computer Networks
Module Overview of Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link: CS454/654 - Issues How
More informationTwo hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. M.Sc. in Advanced Computer Science. Date: Monday 2 nd June 2008.
COMP60242 Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE M.Sc. in Advanced Computer Science Mobile Computing Date: Monday 2 nd June 2008 Time: 09:45 11:45 Please answer any THREE Questions
More informationPerformance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation
Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation Sanjay P. Ahuja, Kyle Hegeman, Cheryl Daucher Department of Computer and Information Sciences University
More informationVoice Recognition Based Smart Home Control System
International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 6, Issue 4 [April 2017] PP: 01-05 Voice Recognition Based Smart Home Control System Awadalla Taifour Ali 1, Eisa
More informationIntroduction to Quality of Service
Introduction to Quality of Service The use of IP as a foundation for converged networks has raised several issues for both enterprise IT departments and ISPs. IP and Ethernet are connectionless technologies
More informationAcceleration Performance Tests for IBM Rational ClearTeam Explorer
Acceleration Performance Tests for IBM Rational ClearTeam Explorer Conducted by Array Networks for IBM Ready for Rational ClearTeam Explorer Certification Table of Contents White Paper Executive Summary
More informationA POLYCOM WHITEPAPER Deploying Enterprise-Grade Wi-Fi Telephony : Coverage, Capacity, Quality of Service, and Security Considerations for Delivering
Deploying Enterprise-Grade Wi-Fi Telephony : Coverage, Capacity, Quality of Service, and Security Considerations for Delivering Excellent Voice Quality on Enterprise Wi-Fi Networks November 2010 Coverage,
More informationEfficient Scalable Encoding for Distributed Speech Recognition
EFFICIENT SCALABLE ENCODING FOR DISTRIBUTED SPEECH RECOGNITION 1 Efficient Scalable Encoding for Distributed Speech Recognition Naveen Srinivasamurthy, Antonio Ortega and Shrikanth Narayanan Standards
More informationCS 457 Multimedia Applications. Fall 2014
CS 457 Multimedia Applications Fall 2014 Topics Digital audio and video Sampling, quantizing, and compressing Multimedia applications Streaming audio and video for playback Live, interactive audio and
More informationOverview of the Session Initiation Protocol
CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction
More informationENSC 427: COMMUNICATION NETWORKS. Performance Evaluation of Voice Over IP on WiMAX and Wi-Fi Based Networks. Spring 2009 FINAL PROJECT
ENSC 427: COMMUNICATION NETWORKS Performance Evaluation of Voice Over IP on WiMAX and Wi-Fi Based Networks Spring 2009 FINAL PROJECT Group #1 Jeremy Yoo http://www.sfu.ca/~jty/ensc427/ jty@sfu.ca i Table
More informationWhat is New in Cisco ACE 4710 Application Control Engine Software Release 3.1
What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 PB478675 Product Overview The Cisco ACE Application Control Engine 4710 represents the next generation of application switches
More informationA Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6
A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 1 Hui Deng 2Xiaolong Huang 3Kai Zhang 3 Zhisheng Niu 1Masahiro Ojima 1R&D Center Hitachi (China) Ltd. Beijing 100004, China 2Dept.
More informationWireless IP for M2M / IoT 101
Wireless IP for M2M / IoT 101 Neo White Paper A concise introduction to using wireless devices for M2M / IoT data transmissions. www.neo.aeris.com Let our experts lead the way Table of Contents INTRODUCTION
More informationQuestions and Answers Alteon's Virtual Matrix Architecture
Questions and Answers Alteon's Virtual Matrix Architecture What is Alteon s Virtual Matrix Architecture (VMA)? Alteon s Virtual Matrix Architecture (VMA) is a revolutionary new approach to scaling the
More informationScalable Multi-DM642-based MPEG-2 to H.264 Transcoder. Arvind Raman, Sriram Sethuraman Ittiam Systems (Pvt.) Ltd. Bangalore, India
Scalable Multi-DM642-based MPEG-2 to H.264 Transcoder Arvind Raman, Sriram Sethuraman Ittiam Systems (Pvt.) Ltd. Bangalore, India Outline of Presentation MPEG-2 to H.264 Transcoding Need for a multiprocessor
More information