• Title/Summary/Keyword: Voice/Data

Search Result 1,250, Processing Time 0.033 seconds

A Study on Voice Communication over Data Communication Network (데이터 통신망에서 음성통신에 대한 연구)

  • 우홍체
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2000.11a
    • /
    • pp.471-475
    • /
    • 2000
  • Voice and data are transmitted over a single packetized data communications network which is designed for data communications. The public switched telephone network for voice and the packet data network for data are merging into a single data network to get efficiency and to reduce operational cost. However, integrating voice and data transmission over a single data network is not easy because voice should be transmitted without delay but data should be transmitted without error. Advances in technology begin to overcome basic differences. Several integration methods in voice and data will be examined and reviewed here. Moreover, trends and problems on integration will be also discussed.

  • PDF

Performance Analysis of a Statistical Packet Voice/Data Multiplexer (통계적 패킷 음성 / 데이터 다중화기의 성능 해석)

  • 신병철;은종관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.11 no.3
    • /
    • pp.179-196
    • /
    • 1986
  • In this paper, the peformance of a statistical packet voice/data multiplexer is studied. In ths study we assume that in the packet voice/data multiplexer two separate finite queues are used for voice and data traffics, and that voice traffic gets priority over data. For the performance analysis we divide the output link of the multiplexer into a sequence of time slots. The voice signal is modeled as an (M+1) - state Markov process, M being the packet generation period in slots. As for the data traffic, it is modeled by a simple Poisson process. In our discrete time domain analysis, the queueing behavior of voice traffic is little affected by the data traffic since voice signal has priority over data. Therefore, we first analyze the queueing behavior of voice traffic, and then using the result, we study the queueing behavior of data traffic. For the packet voice multiplexer, both inpur state and voice buffer occupancy are formulated by a two-dimensional Markov chain. For the integrated voice/data multiplexer we use a three-dimensional Markov chain that represents the input voice state and the buffer occupancies of voice and data. With these models, the numerical results for the performance have been obtained by the Gauss-Seidel iteration method. The analytical results have been verified by computer simylation. From the results we have found that there exist tradeoffs among the number of voice users, output link capacity, voic queue size and overflow probability for the voice traffic, and also exist tradeoffs among traffic load, data queue size and oveflow probability for the data traffic. Also, there exists a tradeoff between the performance of voice and data traffics for given inpur traffics and link capacity. In addition, it has been found that the average queueing delay of data traffic is longer than the maximum buffer size, when the gain of time assignment speech interpolation(TASI) is more than two and the number of voice users is small.

  • PDF

A Medium Access Control Protocol for Voice/Data Integrated Wireless CDMA Systems

  • Lim, In-Taek
    • ETRI Journal
    • /
    • v.23 no.2
    • /
    • pp.52-60
    • /
    • 2001
  • In this paper, a medium access control protocol is proposed for integrated voice and data services in wireless local networks. Uplink channels for the proposed protocol are composed of time slots with multiple spreading codes per slot based on slotted code division multiple access (CDMA) systems. The proposed protocol uses spreading code sensing and reservation schemes. This protocol gives higher access priority to delay-sensitive voice traffic than to data traffic. The voice terminal reserves an available spreading code to transmit multiple voice packets during a talkspurt. On the other hand, the data terminal transmits a packet without making a reservation over one of the available spreading codes that are not used by voice terminals. In this protocol, voice packets do not come into collision with data packets. The numerical results show that this protocol can increase the system capacity for voice service by applying the reservation scheme. The performance for data traffic will decrease in the case of high voice traffic load because of its low access priority. But it shows that the data traffic performance can be increased in proportion to the number of spreading codes.

  • PDF

Comparative Analysis of Performance of Established Pitch Estimation Methods in Sustained Vowel of Benign Vocal Fold Lesions (양성후두 질환의 지속모음을 대상으로 한 기존 피치 추정 방법들의 성능 비교 분석)

  • Jang, Seung-Jin;Kim, Hyo-Min;Choi, Seong-Hee;Park, Young-Cheol;Choi, Hong-Shik;Yoon, Young-Ro
    • Speech Sciences
    • /
    • v.14 no.4
    • /
    • pp.179-200
    • /
    • 2007
  • In voice pathology, various measurements calculated from pitch values are proposed to show voice quality. However, those measurements frequently seem to be inaccurate and unreliable because they are based on some wrong pitch values determined from pathological voice data. In order to solve the problem, we compared several pitch estimation methods to propose a better one in pathological voices. From the database of 99 pathological voice and 30 normal voice data, errors derived from pitch estimation were analyzed and compared between pathological and normal voice data or among the vowels produced by patients with benign vocal fold lesions. Results showed that gross pitch errors were observed in the cases of pathological voice data. From the types of pathological voices classified by the degree of aperiodicity in the speech signals, we found that pitch errors were closely related to the number of aperiodic segments. Also, the autocorrelation approach was found to be the most robust pitch estimation in the pathological voice data. It is desirable to conduct further research on the more severely pathological voice data in order to reduce pitch estimation errors.

  • PDF

A Method for the Performance Ehancement of PRMA Protocol for Mobile Voice/Data Integration (음성/데이터 통합형 PRMA 프로토콜의 성능 개선 기법)

  • 송재섭;김연수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.3B
    • /
    • pp.423-430
    • /
    • 2000
  • Future microcellular systems will require distributed network control. A packet-switched network is suitable for this requirement. The packet reservation multiple access(PRMA) is a Reservation-ALOHA like protocol for wireless terminals to transmit packet speech to a base station. It allows spatially distributed users in cellular systems to transmit packeted voice and data to a common base station using a shared channel. In the existing PRMA, the problem is that the voice packets may collide with the data packets due to simultaneous channel access. the problem may be a major performance degradation factor to a voice and data mixed system. We propose a new PRMA method that integrates voice and data traffic efficiently by resolving the collision problem between data and voice packets. The proposed PRMA method gives a performance improvement than the existing PRAMA method in terms of voice packet dropping probability and data delay characteristic. From analytic results, we can confirm that the proposed PRMA method show a performance improvement than the existing PRMA protocol.

  • PDF

A Study on the Performance Evaluation for the Integrated Voice/Data Transmission with FDDI (FDDI 음성/데이타 집적 전송에서의 성능 분석에 관한 연구)

  • 홍성식;박호균;이재광;류황빈
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.3
    • /
    • pp.277-287
    • /
    • 1992
  • In this paper, we study the performance eualuations of the FDDI Network, by mathmeticlal analysis and simulation, in which the Integrated Voice/Data transmission system with voice traffic in synchronous mode and data traffic inasynchronous mode.For the mean waiting times of Voice/Data packet, we use two-state of Marcov models for voice traffic with talkspurt and silenci state, and the data traffic would traffic would transmit at the silence state of voice traffic. By the mean wating times, we analyze the relations between synchronous and asynchronous mode. As a result, using Sync/Async mode with voice and data, voice was not under influnece of data traffic. and in the same time,data can be tanaxmitted in a short waiting time, too.

  • PDF

Voice Analysis of Chronic & Daily Voice Burden in Professionals (직업적인 음성과사용자들의 음성 부담에 대한 평가)

  • 남순열;김준모;박형욱;이석우;박혜성;김상윤;유승주
    • Journal of the Korean Society of Laryngology, Phoniatrics and Logopedics
    • /
    • v.12 no.1
    • /
    • pp.17-21
    • /
    • 2001
  • Aims of study : The purpose of this study is to measure the chronic and daily voice burden of the professionals in their actual working places. These will be a valuable guideline for preventing and controlling the voice production of professionals. Material and method : Our study was selected to the 10 female telephone operators in the Asan Medical Center, ages ranging from 22 to 38 years old. The symptoms and acoustic analysis of both telephone operators and the controls were evaluated before and after their working. The symptoms were evaluated with questionaires, and the acoustic analysis was measured by using CSL (computerized speech laboratory) system. Results : The symptoms of the professional voice abusers are same as those symptoms in laryngeal fatigue. The acoustic analysis before their working were significantly increased in jitter and shimmer, in comparison with the data of the control. This shows that the experimental group is exposed to the chronic burden of voice production. The jitter, shimmer, and NHR after their working are significantly increased in comparison with the data of the acoustic analysis before their working. This also shows that the experimental group is exposed to the daily burden of voice production. Conclusion : The acoustic analysis of the professional voice overusers has objectively measured that there are chronic and daily overloading to the voice of operators, and these will be a valuable data for preventing and controlling the professionals that abuse their voice.

  • PDF

An Acoustic Study on the Voice Imitation(3) - Based on a professional voice imitator′s speech - (모방 발화의 음향음성학적 연구(3) -전문 성대 모사자의 자료를 중심으로-)

  • Ahn Byoung-seob;Park Mi-young
    • MALSORI
    • /
    • no.52
    • /
    • pp.1-14
    • /
    • 2004
  • In this study, we investigated acoustic characteristics of imitated utterances by a professional voice imitator, focusing on prosodic properties such as vowel formants and f0 distribution. To see the patterns of a voice imitation by a professional voice imitator, we compared the imitator's voice data with target speakers' voice data. The professional imitator, Mr. Bae produced utterances imitating the former President Kim's, the comedian Choi's, and the singer Bae's voices. Auditorily, the imitator was judged to imitate all the target speakers' voices successfully. However, acoustic examination showed that the imitator was better at imitating the singer Bae's voice in that the imitator's and the singer Bae's voices are more alike with respect to vowel formants and f0 distribution. We infer this is because the imitator's normal voice is very similar to the singer Bae's voice. On the other hand, the imitator's voice data showed that the patterns of vowel formants and f0 distribution found in the imitator's imitation voices of the other two target speakers were different from those of target speakers' voices.

  • PDF

Security Exposure of RTP packet in VoIP

  • Lee, Dong-Geon;Choi, WoongChul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.59-63
    • /
    • 2019
  • VoIP technology is a technology for exchanging voice or video data through IP network. Various protocols are used for this technique, in particular, RTP(Real-time Transport Protocol) protocol is used to exchange voice data. In recent years, with the development of communication technology, there has been an increasing tendency of services such as "Kakao Voice Talk" to exchange voice and video data through IP network. Most of these services provide a service with security guarantee by a user authentication process and an encryption process. However, RTP protocol does not require encryption when transmitting data. Therefore, there is an exposition risk in the voice data using RTP protocol. We will present the risk of the situation where packets are sniffed in VoIP(Voice over IP) communication using RTP protocol. To this end, we configured a VoIP telephone network, applied our own sniffing tool, and analyzed the sniffed packets to show the risk that users' data could be exposed unprotected.

Why Mobile Operators Introduced Data Plans: An Analysis of Voice and Data Usage Patterns

  • Lee, Hoon
    • Journal of information and communication convergence engineering
    • /
    • v.14 no.1
    • /
    • pp.9-13
    • /
    • 2016
  • With the introduction of the data-oriented plan for LTE service, one may concerned with the background of the ISP's policy in charging for LTE services. In this work we investigate the latest usage patterns of voice and data applications for customers over the current mobile network, via which we investigate why mobile operators introduced data-oriented plans. To be specific, we collected the real-field data for the volume of voice and data traffic from the LTE network before the data-oriented plans were introduced. From the collected data we compute the absolute volume as well as the proportion of voice and data applications. From these observations we infer mobile operators' reasoning behind the decision to introduce data-oriented plans with unlimited voice calls over the mobile network.