hash
stringlengths
32
32
doc_id
stringlengths
7
13
section
stringlengths
3
121
content
stringlengths
0
2.2M
7286580a67810ca5375b48d11790fdc8
102 125
7.3 Advanced functionality-related interaction elements
The areas below should be regarded as more advanced for the time being. However, what is regarded as a common, basic level is continuously being shifted upwards, these areas are on their way to becoming common and widespread elements, accessing mobile ICT devices and services.
7286580a67810ca5375b48d11790fdc8
102 125
7.3.1 Structure and vocabulary of spoken commands
The harmonization of the vocabulary of spoken commands for ICT devices and services offers obvious advantages to users. Since it is necessary to learn the vocabulary of spoken commands, switching between two non-harmonized devices would raise the learning effort of each user considerably. Any harmonization effort shoul...
7286580a67810ca5375b48d11790fdc8
102 125
7.3.2 Address book data format and portability
For users switching from one communication device to another, one of the strenuous tasks is the transfer of personal data, e.g. the address book data, to their new device. This process can be enhanced considerably by standardizing the format of data in the address book. With such harmonized data formats, address book c...
7286580a67810ca5375b48d11790fdc8
102 125
7.3.3 Organizer data format and portability
As in the clause above, the data used in the organizer functionality of many mobile communication devices can be the target of a harmonization activity. There is no competitive advantage to be gained from offering alternate data formats of an organizer. Again, the user interface design of the organizer should be left t...
7286580a67810ca5375b48d11790fdc8
102 125
7.3.4 V-cards, business card information
There already are a number of V-card implementations in different mobile phones as well as in PDAs which enable the free exchange of business card information across these devices, using mostly wireless (but also wired) transmission technologies. This quasi-standard defined by the industry could be extended to cover al...
7286580a67810ca5375b48d11790fdc8
102 125
7.3.5 Terminology of network services
The terminology arguments discussed above are valid for the wording used in service implementations (e.g. for WAP browser functionality or SMS words like "Server" and "Service centre" are not well known and understood by users). If users have any problem using one of these systems they will not be able to correct these...
7286580a67810ca5375b48d11790fdc8
102 125
7.3.6 Universal addressing in converging networks
Personal, media-transparent user addressing in converging networks should interwork, seamless to the end user, with terminal devices and network services. Otherwise, parts of a nice concept will be jeopardized due to lack of smooth interworking (e.g. if a user activates a certain "In meeting" behaviour locally, in the ...
7286580a67810ca5375b48d11790fdc8
102 125
7.3.7 Positioning services
Mobile positioning is technically possible already in today's mobile networks. The US Government has recently enacted a law to locate cell phones making emergency calls. Applications and services are currently being deployed, e.g. addressing corporations with fleet management applications and consumers with FriendFinde...
7286580a67810ca5375b48d11790fdc8
102 125
7.3.8 Service and content presence and connectivity
Users of mobile communication have traditionally had continuous access to a set of well-known, well-configured and always available set of services. The feature-richness of mobile networks, systems, services and applications is on the increase, enabled by the on-going convergence between traditional voice and data serv...
7286580a67810ca5375b48d11790fdc8
102 125
7.3.9 User data privacy, security and safety
With users having an increasing ability to personalize their communication environment, there is a risk that the information required to personalize the product or service may be abused. To ensure that users are confident that their information is not used in ways of which they disapprove, they need standardized ways t...
7286580a67810ca5375b48d11790fdc8
102 125
8 Conclusions and recommendations
The availability of common, basic interactive elements increases the user transfer of learning between devices and services and improves the overall usability of the entire interactive mobile environment. Such a transfer becomes even more important in a world of ubiquitous mobile telecommunication devices and services....
a414c2e68cf062528e7f92ca07167624
102 069
1 Scope
The present document applies to Radio equipment to be operated in the 865 MHz to 868 MHz frequency range and using a Direct Sequence Spread Spectrum modulation technique for asset tracking of lost or stolen items and emergency tracing of persons. The transponders are silent and activated only in the extreme and rare co...
a414c2e68cf062528e7f92ca07167624
102 069
2 References
For the purposes of this Technical Report (TR) the following references apply: [1] ERC/REC 70-03: "Relating to the use of Short Range Devices (SRD)". [2] ETSI EN 300 422: "ElectroMagnetic Compatibility and Radio Spectrum Matters (ERM); Technical characteristics and test methods for wireless microphones in the 25 MHz to...
a414c2e68cf062528e7f92ca07167624
102 069
3 Definitions and abbreviations
a414c2e68cf062528e7f92ca07167624
102 069
3.1 Definitions
For the purposes of the present document, the following terms and definitions apply: power density: level of power in Watts per Hertz generated within the power envelope spread spectrum modulation: modulation technique in which the energy of a transmitted signal is spread throughout a relatively large portion of the fr...
a414c2e68cf062528e7f92ca07167624
102 069
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply: CEPT European Conference of Postal and Telecommunications Administrations DSSS Direct Sequence Spread Spectrum DTOA Differential Time Of Arrival ECC Electronic Communications Committee RF Radio Frequency TLSI Tracing Lost and Stolen Items
a414c2e68cf062528e7f92ca07167624
102 069
4 Executive summary
The present document reflects the general characteristics of systems for tracking lost or stolen items and emergency tracing of persons using DSSS and DTOA. It was drafted in order to assess the sharing possibilities of DSSS with existing systems operating in accordance with the CEPT regulations. The system is designed...
a414c2e68cf062528e7f92ca07167624
102 069
5 Detailed information on the various aspects
a414c2e68cf062528e7f92ca07167624
102 069
5.1 Estimated number of DSSS transponders (worst condition)
Let's assume a city with the population of 5 million people and about 2 million cars. An optimistic penetration rate after a few years of operation into the vehicle market will be assumed as 5 % (In Israel, for example, with about 2 Million cars, after 5 years of operation of the TLSI system there are 140 000 cars equi...
a414c2e68cf062528e7f92ca07167624
102 069
5.2 Estimated number of active transponders (worst condition)
In the TLSI system the transmissions from the transponders are caused by an event which is defined as an attempt to steal the asset equipped with this device. In the vehicle market, statistically 3 % stolen vehicles out of the overall fleet per year is considered high. We will use this figure as a parameter for our fur...
a414c2e68cf062528e7f92ca07167624
102 069
5.3 Limitation of the duty cycle of the transponders
The clause above demonstrates the low number of active transponders in given area. In order however to assure interference free operation of the transponders an automatically limitation of the duty cycle to the maximum level of 0,03 % over a one hour period will be built in. It remains a potential future problem, that ...
a414c2e68cf062528e7f92ca07167624
102 069
5.4 Advantage of the use of DSSS and DTOA
Current solutions for the location of stolen items might not be able to resist to the slightest attempt of radio jamming. Once these solutions will be widely installed, such low-cost and simple "electronic warfare" will be practised by thieves and will no doubt cause "collapse" of these protective measures. DTOA locati...
a414c2e68cf062528e7f92ca07167624
102 069
5.5 The economic benefits
The trade in stolen items has become an international problem and a growing number of these items are taken from one country to another. With the opening of borders within Europe there is an increasing need for tracking and tracing of lost and stolen items. Many stolen items such as cars are actually sold in other Euro...
a414c2e68cf062528e7f92ca07167624
102 069
5.6 Social benefit
In addition to the economic benefit, introduction of this technology will contribute to the quality of life of specific categories of population (emergency tracing). This technology is also designed for tracking applied for high-risk personnel (police, security personnel, etc.), emergency assistance and disabled people...
a414c2e68cf062528e7f92ca07167624
102 069
5.7 Spectrum requirement and justification
The Strategic Plan for the 862 MHz to 868 MHz proposed by the SRD MG and approved by FM WG offers the opportunity for introduction of DSSS technologies. "The frequency band 863 MHz to 870 MHz should be considered for non-specific spread spectrum SRD applications by using Direct Sequence Spread Spectrum (DSSS) and/or Fr...
a414c2e68cf062528e7f92ca07167624
102 069
5.8 Polling transmitters
Polling transmitters are operating outside the band 862 MHz to 870 MHz and are using existing paging channels in accordance with existing rules and procedures. The frequency band used depends on the region of operation. There is no uncontrolled automatic polling and the transponders are programmed to ensure that respon...
a414c2e68cf062528e7f92ca07167624
102 069
5.9 Technical Issues
Applications and Market information: see annex A. Technical description: see annex B. Expected Compatibility studies: see annex C. ETSI ETSI TR 102 069 V1.1.1 (2002-07) 10
a414c2e68cf062528e7f92ca07167624
102 069
5.10 Current Regulation - Region 1 and CEPT allocation
RR Region 1 Allocation and RR footnotes relevant to CEPT and frequency band European Common Allocation Utilization EU footnote ECC/ERC document Standard Note Defence systems Mobile applications restricted to tactical links and SAB/SAP including radio microphones Radio Microphones ERC/REC 70-03 EN 300 422 On a tuning ra...
a414c2e68cf062528e7f92ca07167624
102 069
6 Main conclusions
The UHF band 865 MHz to 868 MHz meets the market requirements in allowing different DSSS systems to operate providing co-existence with other SRD applications. The low power density due to DSSS modulation scheme, very low duty cycle and the short transmission pulse duration, assures the efficient use of the spectrum. P...
a414c2e68cf062528e7f92ca07167624
102 069
6.1 Requested ECC actions
Compatibility evaluations and studies for services as defined in annex C. Update of ERC/REC 70-03 [1]. ETSI ETSI TR 102 069 V1.1.1 (2002-07) 12 Annex A: Detailed market information A.1 Range of applications for TLSI using DSSS Differential Time of Arrival (DTOA) location technology utilizing Direct Sequence Spread Spec...
bf400c609838285a1af268db3408eb49
102 024-7
1 Scope
The present document provides a collection of informative background information and guidance to supplement parts 1 to part 6 of TS 102 024. The issues covered concern the practical design phases for both equipment and networks with respect to speech performance, and therefore is relevant to TIPHON equipment manufactur...
bf400c609838285a1af268db3408eb49
102 024-7
2 References
For the purposes of this Technical Report (TR) the following references apply: [1] ETSI TS 102 024-2: "Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON) Release 4; End-to-end Quality of Service in TIPHON Systems; Part 2: Definition of Speech Quality of Service (QoS) Classes". [2] ETSI TS 102...
bf400c609838285a1af268db3408eb49
102 024-7
3 Definitions and abbreviations
bf400c609838285a1af268db3408eb49
102 024-7
3.1 Definitions
For the purposes of the present document, the following terms and definitions apply: dBm: power level with reference to 1 mW dBm0: at the reference frequency (1 020 Hz), L dBm0 represents an absolute power level of L dBm measured at the transmission reference point (0 dBr point), and a level of L + x dBm measured at a ...
bf400c609838285a1af268db3408eb49
102 024-7
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply: ACR Absolute Category Rating ADSL Asymmetric Digital Subscriber Line AEC Acoustic Echo Control ALC Automatic Level Control ALC Automatic Level Control ASL Active Speech input Level ATM Asynchronous Transfer Mode DCME Digital Circuit Multiplica...
bf400c609838285a1af268db3408eb49
102 024-7
4 General considerations
The realization of end to end speech quality in a TIPHON system is determined by a combination of user equipment design, service provider equipment performance and network transmission planning. To guarantee end to end speech quality: • user equipment must meet specified performance requirements; and • service provider...
bf400c609838285a1af268db3408eb49
102 024-7
4.1 Transmission planning
In order to deliver the intended end-to-end speech transmission quality in TIPHON systems, transmission planning should be performed during the design phase of TIPHON related equipment. It is not sufficient to design equipment or networks just along the requirement limits of the respective TIPHON class. An advantage fa...
bf400c609838285a1af268db3408eb49
102 024-7
4.2 User interaction
User interaction with regard to the change of certain transmission parameters may be provided by equipment which forms part of a TIPHON connection, e.g. a TIPHON terminal may include a PC client software which provides adjustment of Loudness Rating to the user (see clause 5.1.2 for further guidance).
bf400c609838285a1af268db3408eb49
102 024-7
4.3 Maintenance
After TIPHON equipment and networks have been designed, planned and rendered operative in compliance with one the TIPHON QoS classes it might - nevertheless - occur that users complain about too low speech quality. In such cases, it is very important to be able to carry through a diagnosis of end-to-end speech transmis...
bf400c609838285a1af268db3408eb49
102 024-7
4.4 Monitoring & verification
Even if a specific TIPHON system has been operated for some time at the desired level of customer satisfaction it will be required to continuously monitor and check the end-to-end speech transmission quality. Verification will require access to the actual settings of all major transmission parameters - including those ...
bf400c609838285a1af268db3408eb49
102 024-7
4.5 Interconnection of TIPHON systems with other IP networks
Implementers of TIPHON networks are advised that IP networks other than those following the TIPHON regime, eventually may employ different QoS classification schemes than the one defined in [1]. As an example, in the following the TIPHON approach is compared to the TIA approach taken in [2]. ETSI ETSI TR 102 024-7 V4.1...
bf400c609838285a1af268db3408eb49
102 024-7
5 Guidance on main transmission parameters
Codec Performance Network Delay Network Packet Loss Network Jitter Overall Delay Overall Packet Loss Jitter Buffers Perceived Quality Packet Loss Concealment Figure 5: Interaction of transmission aspects, e.g. the influence of jitter buffers on packet loss and delay
bf400c609838285a1af268db3408eb49
102 024-7
5.1 Loudness ratings
bf400c609838285a1af268db3408eb49
102 024-7
5.1.1 General considerations
bf400c609838285a1af268db3408eb49
102 024-7
5.1.2 IP terminals
This is for further study.
bf400c609838285a1af268db3408eb49
102 024-7
5.1.3 IP gateways
This is for further study.
bf400c609838285a1af268db3408eb49
102 024-7
5.2 Mean one-way delay
bf400c609838285a1af268db3408eb49
102 024-7
5.2.1 Absolute delay
Absolute delay is the end-to-end delay from mouth to ear. See ITU-T Recommendation G.114 [11] and clause 5.3 of TS 102 024-2 [1] for further information. ETSI ETSI TR 102 024-7 V4.1.1 (2003-09) 15
bf400c609838285a1af268db3408eb49
102 024-7
5.3 Delay jitter
bf400c609838285a1af268db3408eb49
102 024-7
5.3.1 Jitter buffer implementations
bf400c609838285a1af268db3408eb49
102 024-7
5.3.1.1 Static jitter buffers
A static dejittering mechanism delays the first arriving packet for a time equal to the dejittering delay. After this dejittering delay the dejittering buffer is read at constant rate. Packets that arrive before their play-out instant are temporary stored in the dejittering buffer. Packets that arrive too late (after t...
bf400c609838285a1af268db3408eb49
102 024-7
5.3.1.2 Dynamic Jitter Buffers
It is possible to use an algorithm that will dynamically adjust the dejittering delay, it will estimate the variable part of the delay of the first packet and adjust the dejittering delay accordingly. Such an algorithm has several advantages. The delay is minimized and buffer underflows are avoided. Also, when a static...
bf400c609838285a1af268db3408eb49
102 024-7
5.3.2 Jitter buffer monitoring capabilities
Often, the exact Jitter Buffer algorithm is partially unknown. This can cause many problems and uncertainties in implementing a Voice over IP service. If a jitter buffer algorithm is partially unknown or cannot be disclosed, it remains necessary to be able to evaluate how well a particular jitter buffer performs under ...
bf400c609838285a1af268db3408eb49
102 024-7
5.3.3 Impact
As dynamic jitter buffers become more common, an estimation of their performance relative to that of static jitter buffers will be needed. Modelling dynamic jitter buffers is an order more difficult than modelling static jitter buffer due to the feedback involved in dynamic jitter buffers. A first estimation of the imp...
bf400c609838285a1af268db3408eb49
102 024-7
5.4 Echo loss, echo cancellation
It is assumed that TIPHON end-to-end connections are equipped with proper echo control. However, to be sure about the actual perceived end-to-end speech quality, the service provider is advised to continously monitor (non-intrusive) and incidently check (intrusive test measurements) the talking quality with respect to ...
bf400c609838285a1af268db3408eb49
102 024-7
5.4.1 General considerations
The determination of values for the Echo Loss within the SCN is based on reasonable assumptions. With the understanding that the SCNs today are mostly fully digital with either analogue or digital terminals, two major cases with respect to Echo Loss appear: • Analogue terminal with a Transhybrid Loss in the local excha...
bf400c609838285a1af268db3408eb49
102 024-7
5.4.2 IP terminals
ANSI/TIA/EIA-810-A-2000 [15] specifies the following requirements for weighted Terminal Coupling Loss (TCLw): "The normalized value of TCLw loss shall be greater than 52 dB for IP sets and 45 dB for PCM sets when measured under free field conditions and with SLR normalized to 8 dB and RLR normalized to 2 dB. It is desi...
bf400c609838285a1af268db3408eb49
102 024-7
5.4.3 IP gateways
IP Gateways should provide Echo Cancellers in accordance with ITU-T Recommendation G.168 [16].
bf400c609838285a1af268db3408eb49
102 024-7
5.5 Coding distortion
bf400c609838285a1af268db3408eb49
102 024-7
5.5.1 General considerations
The Equipment Impairment Factor of the E-model (ITU-T Recommendation G.107 [17]) is now recommended for all systems. The earlier method that used Quantization Distortion Units is no longer recommended. For information values for the equipment impairment factor of various coding devices can be found in Appendix I to ITU...
bf400c609838285a1af268db3408eb49
102 024-7
5.6 Speech processing other than coding
bf400c609838285a1af268db3408eb49
102 024-7
5.6.1 General considerations
Recently, a number of speech processing devices have been defined, standardized and deployed in the network environment, the impact on speech transmission performance of which has not been considered in the E-model, yet. In the presence of long delay the interactions of specific modern network equipment, e.g.: • Automa...
bf400c609838285a1af268db3408eb49
102 024-7
5.6.2 IP terminals
This for further study.
bf400c609838285a1af268db3408eb49
102 024-7
5.6.3 IP gateways
This is for further study.
bf400c609838285a1af268db3408eb49
102 024-7
5.7 Transcoding in network elements
Transcoding shall be avoided whenever possible. It will introduce additional delay and more importantly distortion. However, in certain cases (e.g. a GSM call traversing a TIPHON network and terminating in a PSTN) transcoding is inevitable. In table 2 the impact of transcoding on the speech quality is shown for differe...
bf400c609838285a1af268db3408eb49
102 024-7
5.8 Packet loss
bf400c609838285a1af268db3408eb49
102 024-7
5.9 Example of TIPHON QoS parameter allocation
The intent of this clause is to provide an example of how the end-to-end performance parameters of the TIPHON QoS classes may be allocated between user equipment and service provider equipment and networkmay be achieved. Table 3 shows the main parameters which impact end-to-end speech quality in VoIP systems, and their...
bf400c609838285a1af268db3408eb49
102 024-7
6 Calculation and planning examples
This clause provides guidance how transmission planning using the E-Model can be applied to TIPHON networks. It should be noted, that the examples provided in this clause are structured according to the respective transmission parameters and effects, i.e., loudness ratings, mean one-way delay, speech processing and pac...
bf400c609838285a1af268db3408eb49
102 024-7
6.1 Examples with respect to loudness ratings
This is for further study.
bf400c609838285a1af268db3408eb49
102 024-7
6.2 Examples with respect to mean one-way delay
The term "mean one-way delay" is defined as half the sum of the transmission time in both transmission directions of a connection. With a static de-jitter buffer at the receive side the end-to-end delay between the speaker and listener is assumed to be constant for the duration of a call and jitter will have been remov...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.1 Delay due to speech processing and packetization
One of the mostly discussed items during the design phase of a piece of VoIP equipment is the "real" load of the network, e.g. the LAN, as a function of chosen speech codec. However, this discussion considers only a part of a multi-dimensional problem, since the "parameters": • codec type; • size of the IP header; • si...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.2 Planning examples regarding the occurrence of long delay
The following clauses are intended to provide detailed guidance on the effect of long delay, on the applicability and usage of the E-Model under such circumstances and explicitly on the proper use of the Advantage Factor A in such situations.
bf400c609838285a1af268db3408eb49
102 024-7
6.2.2.1 Introduction
The transmission impairments associated with long delay are best analyzed by separating the echo-induced degradation and the subjective difficulty due to pure delay. Appropriate use of echo cancellers has been shown to indeed provide international or national satellite connections yielding listening-only quality (under...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.2.1.1 Application of the advantage factor A with respect to the following examples
Whereas clause 4.1 provides the general statement that an Advantage Factor A does not apply for TIPHON systems, the following clauses are intended to provide guidance on how A can be applied in individual cases. In conjunction with their task mentioned above, designers and network planners may wish to consider the "Adv...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.2.1.4 Purpose and general structure of the following examples
The following examples are intended to provide detailed guidance on the effect of long delay, on the applicability and usage of the E-Model under such circumstances and explicitly on the proper use of the Advantage Factor A in such situations. The structure of the examples provided in the following clauses is summarize...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.2.4 Summary on planning results for long delay
As can be seen from the example calculations above the user's perception the very same connection (in terms of the equipment used) will be perceived significantly different depending on the circumstances as outlined in clause 6.2.2.1 ("Competition" or "Hard-to-reach" and the kind of communication situation). Table 8 su...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.3 VoIP end-to-end delay budget planning for private networks
This clause provides a more detailed view of VoIP one-way end-to-end delay sources in a private IP network or intranet. End-to-end delay will be used synonymously with one-way delay in this clause. Clause 6.3.2.2 covers delay sources in an example worst-case end-to-end private network. Clauses 6.3.2.3 and 6.3.2.4 show ...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.3.1 VoIP end-to-end delay sources overview
Figure 18 shows a VoIP end-to-end private network connection and lists the main delay sources for each section of the network. There are basically two types of delay source, fixed or variable and each delay source in figure 18 is listed in one of the two categories. Core Network Core Network Routers Orginating Gateway ...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.3.2 VoIP end-to-end delay sources definitions
Vocoder Encoding Details on the vocoder delays are from ITU-T Recommendation G.114 [11] and also see section 5.2.1 of TIA/EIA/TSB116. This consists of fixed delays, look ahead, the encoding process and packetization. There is also the additional serialization delay to transmit the packets over the 10/100 Base T link, b...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.3.3 VoIP End-to-end Delay Budget Case 1
Table 10: Case 1a - VoIP End-to-end delay budget Case 1a: L1 = 10 Mb/s; L2 = 128 kb/s; Data MTU max = 128 Codec type: G.729 G.729 G.729 G.729 10,00 10,00 20,00 20,00 Delay type Units Fixed (ms) Variable (ms) Fixed (ms) Variable (ms) A-side phone Encoding process delay Codec Look ahead ms 5,0 5,0 Encoding compression ms...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.3.4 VoIP End-to-end Delay Budget Case 2
Table 12: Case 2a - VoIP End-to-end delay budget Case 2a: L1 = 10Mb/s; L2 = 1544kb/s; Data MTU max= 128 Codec type: G.729 G.729 G.729 G.729 10,00 10,00 20,00 20,00 Delay type Units Fixed (ms) Variable (ms) Fixed (ms) Variable (ms) A-side phone Encoding process delay Codec Look ahead ms 5,0 5,0 Encoding compression ms 1...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.4 E-Model analysis of the VoIP over MPLS reference model
This clause analyses the requirements for Voice QoS on MSF Networks. MSF Networks are intended to support a full range of services including existing PSTN and Cellular services, these applications are analysed in the context of a Global Reference Connection. A number of scenarios are addressed which are typical of curr...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.4.1 Introduction
The ITU-T standards for voice network QoS are defined in relation to a Global Reference Connection, which is intended to represent the worst case international situation. This paper takes a PSTN call from Japan to East-coast USA and a GSM call from Australia to East-coast USA as being representative of Global Reference...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.4.2 MPLS in core networks only
bf400c609838285a1af268db3408eb49
102 024-7
6.2.4.2.1 Scenario 1 - Multiple MPLS Networks
In this scenario two MPLS networks are traversed in Japan and the USA for the PSTN case and one MPLS network in Australia and two in the USA for the GSM case. The analysis covers a range of intrinsic delay (packetization + average read-out buffer) from 10 msec to 100 msec and the packet loss for each MPLS domain is set...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.4.2.2 Scenario 2 - PSTN and typical DCME practice
In this case the scenario is simplified to a single MPLS network in Japan and the USA but the DCME scenario is changed to show the impact of Voice Activity Detection and downspeeding. The Intrinsic Delay of a single MPLS network is analysed from 10 msec to 100 msec and the packet loss scenarios cover the same 0 %, 0,5 ...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.4.2.3 Scenario 3 - GSM and Typical DCME practice
In this scenario the network is simplified to a single MSF domain in Australia and another in the USA and the analysis covers the impact of typical DCME practice. In this case only 0 % packet loss is considered. Three DCME cases are considered, G.711 i.e. no DCME, G.726 at 32 kb/s and G.728 with downspeeding to 12,8 kb...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.4.2.4 VoMPLS core network summary
Multiple MPLS islands are a natural consequence of switch deployment practice. A carrier wishing to deploy MPLS as a PSTN solution would wish to continue normal investment to cope with growth and retiring obsolete equipment. This will lead to multiple MPLS islands within a single carriers' network as well as islands wh...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.4.3 Extending VoMPLS into the access network
The following scenarios analyse the impact of extending VoMPLS into the access network.
bf400c609838285a1af268db3408eb49
102 024-7
6.2.4.3.1 Scenario 4 - VoMPLS access on USA to Japan
In this scenario the core network comprises 2 MPLS networks in USA plus 2 MPLS networks in Japan linked by sub cable which may have DCME employed. The intrinsic delay within each core MPLS network is set to 10 ms delay and zero packet loss is assumed. The encoding scheme used is G.711 throughout. Figure 22 illustrates ...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.4.3.2 Scenario 5 deployment of GSM and VoMPLS access
In this scenario the core network comprises 2 MPLS networks in USA plus 1 MPLS network and a mobile network in Australia linked by sub cable which does not have DCME employed. Each core MPLS network has 10 ms intrinsic delay and zero packet loss. Encoding G.711 throughout MPLS domains. Figure 24 illustrates the deploym...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.4.4 Effects of Voice Codecs in the access network
In the final scenarios the impact of deploying voice codecs within the access network is considered. ETSI ETSI TR 102 024-7 V4.1.1 (2003-09) 52 6.2.4.4.1 Scenario 6 - Deployment of Codecs in one Access Leg (USA – Japan) Again the core network comprises 2 MPLS networks in USA plus 2 MPLS networks in Japan linked by sub ...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.4.4.2 Scenario 7 - Codec Deployment in both Access Legs (USA - Japan)
The deployment configuration for this scenario is as scenario 6 with the exception that MPLS access systems are used at both ends. The configuration is illustrated in figure 28. and the resultant R-values provided in table 17 and figure 29. TE --|MPLS|---|MPLS|--|MPLS|---------|MPLS|--|MPLS|--|MPLS|--TE Dig Access Core...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.4.4.3 Scenario 8 codec deployment and mobile access (USA - Australia)
The core network comprises 2 MPLS networks in the USA plus 1 MPLS network and a mobile network in Australia linked by sub cable which does not have DCME employed. Each core MPLS core network has 10 ms intrinsic delay and zero packet loss. The access network has 50 ms delay and zero packet loss. Full echo control is emp...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.4.4.4 Voice codec summary
The scenarios in this clause highlight the critical impact that the voice coding scheme deployed in the access network will have on the overall voice quality. For international reference connections acceptable voice quality may not be attained with some of the very low bit rate codecs. The benefits of avoiding transcod...
bf400c609838285a1af268db3408eb49
102 024-7
6.2.4.5 Overall conclusions
The following key conclusions may be drawn from the study: 1) For VoMPLS core networks, per domain the intrinsic delay should not exceed 10 ms and the packet loss should be negligible. 2) When MPLS is extended to the access domain (in conjunction with the use of digital terminals) an additional 50 ms per access domain ...
bf400c609838285a1af268db3408eb49
102 024-7
6.3.1 TIPHON QoS class "narrowband high (2H)"
Figure 32 shows a connection with all values default according to ITU-T Recommendation G.107 [17], except the mean one-way delay and the equipment impairment factor Ie for the coding distortion, which are set to the lower limits of TIPHON class #2H. As no (or no proper) echo cancellation is provided, the overall transm...
bf400c609838285a1af268db3408eb49
102 024-7
6.3.2 TIPHON QoS class "narrowband medium (2M)"
Figure 35 shows a connection with all values default according to ITU-T Recommendation G.107 [17], except the mean one-way delay and the equipment impairment factor Ie for the coding distortion, which are set to the lower limits of TIPHON class #2M. As no (or no proper) echo cancellation is provided, the overall transm...
bf400c609838285a1af268db3408eb49
102 024-7
6.3.3 TIPHON QoS class "narrowband acceptable (2A)"
Figure 38 shows a connection with all values default according to ITU-T Recommendation G.107 [17], except the mean one-way delay and the equipment impairment factor Ie for the coding distortion, which are set to the lower limits of TIPHON class #2A. As no (or no proper) echo cancellation is provided, the overall transm...
bf400c609838285a1af268db3408eb49
102 024-7
6.4 Examples with respect to coding distortion
This is for further study. 6.5 Examples with respect to speech processing other than coding This is for further study.