hash
stringlengths
32
32
doc_id
stringlengths
7
13
section
stringlengths
3
121
content
stringlengths
0
2.2M
6ccf47bdd683c4e0ec0322d450b82da1
101 589
6.2.4.5 NBR-ADV construction
This clause specifies only the steps of NBR-ADV construction affected by the reception of new NBS parameters via Radio_Config_Update_Rpt messages. As specified above, Radio_Config_Update_Rpt messages contain the following parameters: • NBS BS-ID • NBS preamble index • NBS UCD and DCD count • NBS UCD and DCD settings NB...
6ccf47bdd683c4e0ec0322d450b82da1
101 589
6.3 Automatic FFR regulation for reuse 1
6ccf47bdd683c4e0ec0322d450b82da1
101 589
6.3.1 General FFR approach
Fractional Frequency Reuse (FFR) means that every BS is using a part of the channel e.g. for OFDM technology composed of certain subset of subcarriers. In addition to that, the BS can split the frame interval into two or more zones where different subsets are used. Figure 6.10 shows a fragment of FFR based deployment. ...
6ccf47bdd683c4e0ec0322d450b82da1
101 589
6.3.2 Inter-cell FFR coordination
Inter-Cell FFR Coordination refers to a coordination of operations of adjacent cells, targeting reduction of mutual interference. This functionality can improve cell edge throughput and area reliability. Service providers may consider using FFR/segmentation and ICIC to fine-tune their network performance.
6ccf47bdd683c4e0ec0322d450b82da1
101 589
6.3.2.1 Resource blocks categories
Inter-cell FFR coordination function manages radio resources in time-frequency domain such that inter-cell interference is kept under control. This mechanism is inherently a multi-cell RRM function that needs to take into account information (e.g. the resource usage status and traffic load situation) from multiple cell...
6ccf47bdd683c4e0ec0322d450b82da1
101 589
6.3.2.2 Measurements
Every terminal performs measurements per category of RBs, e.g. as follows: Table 6.9: Measurement types Code Measurement type 1. Private RBs of the serving cell 2. Shared RBs of the serving cell 3. Prohibited RBs of the serving cell 4. Private RBs of the neighbour cells 5. Shared RBs of the neighbour cells 6. Prohibite...
6ccf47bdd683c4e0ec0322d450b82da1
101 589
6.3.2.3 RRM function
The RRM function can be centrally located or distributed. In the latter case every BS includes an instance of the RRM function. The functional split of RRM functions is presented in clause 4.2.1.
6ccf47bdd683c4e0ec0322d450b82da1
101 589
6.3.2.4 Protocol
The following messages are used for communication between RRM functions. Figure 6.13: Generic RRM communications Using these messages, the RRM function can negotiate with neighbours the optimal use of the radio resources. ETSI ETSI TR 101 589 V1.1.1 (2013-07) 49 Table 6.10: RRM_Configuration Message purpose Delivery of...
6ccf47bdd683c4e0ec0322d450b82da1
101 589
6.4.1 Interference detection
The BS estimates total interference and interference from neighbour BSs using MS reports as described in clause 6.1. The BS can further estimate interference from same-RAT neighbour BSs based on the interference figures and estimated interference from neighbour BSs using MS reports described in clause 6.1. BS DNS Srv/ ...
6ccf47bdd683c4e0ec0322d450b82da1
101 589
6.4.2 Discovery of interference source
After the BS identified same-RAT neighbour BSs, detected and measured interference from neighbour BSs, the BS can then guess that remaining interference can be caused by sources from other RATs. This is presented in figure 6.16, step (1).
6ccf47bdd683c4e0ec0322d450b82da1
101 589
6.4.3 Association of neighbour and interference
The BS requests from the ICS data of nearby transmitters to narrow down the list of potential interferers. The BS thus creates a list of potential interferers. This is presented in figure 6.16, steps (2) and (3). Next step is to probe all or some of the potential interferers using "generic RRM language" with data {IFst...
3dce2353f126104d8050256e4223a90b
101 584
1 Scope
The present document is motivated by the fact that within the ETSI M2M System semantic information needs to be available on M2M data that is transferred within the M2M system. Through such semantic information M2M data can be discovered by applications that do not have prior knowledge on them. The capability of the ETS...
3dce2353f126104d8050256e4223a90b
101 584
2 References
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. Referenced documents which ar...
3dce2353f126104d8050256e4223a90b
101 584
2.1 Normative references
The following referenced documents are necessary for the application of the present document. Not applicable. ETSI ETSI TR 101 584 V2.1.1 (2013-12) 7
3dce2353f126104d8050256e4223a90b
101 584
2.2 Informative references
The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. [i.1] ETSI TR 102 725: "Machine-to-Machine communications (M2M); Definitions". [i.2] [Guarino, 98] Formal Ontology in Information Systems. NOTE: Available a...
3dce2353f126104d8050256e4223a90b
101 584
3 Definitions and abbreviations
3dce2353f126104d8050256e4223a90b
101 584
3.1 Definitions
For the purposes of the present document, the terms and definitions given in TR 102 725 [i.1] and the following apply. NOTE: A term defined in the present document takes precedence over the definition of the same term, if any, in TR 102 725 [i.1]. Abstract Application Information Model: information model of common func...
3dce2353f126104d8050256e4223a90b
101 584
3.2 Abbreviations
For the purposes of the present document, the abbreviations given in TR 102 725 [i.1] and the following apply. NOTE: An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 102 725 [i.1]. OWL Web Ontology Language RDF Resource Description Framework
3dce2353f126104d8050256e4223a90b
101 584
4 Introduction to semantic information on M2M data
3dce2353f126104d8050256e4223a90b
101 584
4.1 Problem description
Release 1 of ETSI M2M defines a Service Capability Layer which is enabling transport of M2M data between devices or gateways and network applications. Release 1 provides an abstraction layer hiding the heterogeneity of M2M access networks and provides means for secure data transport. By design choice, the ETSI M2M Rel....
3dce2353f126104d8050256e4223a90b
101 584
4.2 Benefits of semantic annotation
By providing means to understand M2M data, the available business models can be greatly enhanced. For example, through offering additional semantic information about the data, platform provider can enable (and potentially charge for) the discovery of devices and data by semantic specification. Another possible business...
3dce2353f126104d8050256e4223a90b
101 584
4.3.1 Heuristic view
Figure 1 shows the hierarchy of semantic information, ranging from raw data to real-world context information. As the picture explains, we are looking at two kinds of data. First the data handled by an ETSI M2M System, e.g. a measured value. Secondly, the data that is describing a specific sensor including information ...
3dce2353f126104d8050256e4223a90b
101 584
4.3.2 Option 1: Standardized Data Types with implicitly defined semantics
Traditionally, communication systems have standardized data types to be commonly used between various applications. The semantic of this information might be defined through the respective standard. Unfortunately, this implicit mapping of a data type to a specific semantic meaning is not always given and might lead to ...
3dce2353f126104d8050256e4223a90b
101 584
4.3.3 Option 2: Standardized Data Types with some defined semantics
RFC 1738 [i.9] defines the syntax and semantic of the Uniform Resource Locator (URL). A URL has the format: <scheme>:<scheme-specific-part> The <scheme> part defined the usage of the URL and also determines how the <scheme-specific-part> is interpreted. The following schemes are reserved and define a mapping between th...
3dce2353f126104d8050256e4223a90b
101 584
4.3.4 Option 3: eXtensible Markup Language (XML)
XML is a framework for defining markup languages. It is used to describe arbitrary complex data structures. XML defines a common syntax to represent data in an ordered, labelled tree. Similar to the Option 1, an XML-based markup language first defines the syntax of the data, not the semantics. XML Schemas enable a synt...
3dce2353f126104d8050256e4223a90b
101 584
4.3.5 Option 4: Ontologies
An ontology represents knowledge as a set of concepts and the relationship between the concepts. Thus using an ontology semantic concepts can be described. Annotating information with ontology references links the information to these concepts. On this basis, semantic tools and mechanisms like reasoning can be employed...
3dce2353f126104d8050256e4223a90b
101 584
4.3.6 A concrete approach for ETSI M2M
An M2M system is set up to acquire data from a large-scale physical system and control it in return. Shared sensors and actuators are distributed as monitoring and control points through this physical system. A set of entities, subsystems of the overall physical system, are defined as the components of the overall phys...
3dce2353f126104d8050256e4223a90b
101 584
4.3.7 Summary
The described options above are some selected ways of adding semantics to information. For ETSI M2M we need to identify the right way of describing information and attaching the needed semantic information to it. In this study we need to identify the requirements and derive the design goals for an ETSI M2M support of s...
3dce2353f126104d8050256e4223a90b
101 584
4.4 Semantic M2M and OBIX mapping
Introduction In the subsequent section we describe a possible semantic data model for ETSI M2M. The design of this model has been guided by two main principles: 1) Separation of the abstract information model from its representation in the ETSI M2M resource structure. The information model proposed in this contribution...
3dce2353f126104d8050256e4223a90b
101 584
4.6 Existing work on semantics that could apply to ETSI M2M
3dce2353f126104d8050256e4223a90b
101 584
4.6.1 Overview
The following works or projects can be related to the present study, directly or indirectly, because they handle semantic data, support the development of semantic data, or allow the extension or exploitation of semantic services.
3dce2353f126104d8050256e4223a90b
101 584
4.6.2 Existing semantic projects
SEALS The SEALS Project is developing a reference infrastructure known as the SEALS Platform to facilitate the formal evaluation of semantic technologies. This allows both large-scale evaluation campaigns to be run (such as the International Evaluation Campaigns for Semantic Technologies) as well as ad-hoc evaluations ...
3dce2353f126104d8050256e4223a90b
101 584
5.1 Overview
3dce2353f126104d8050256e4223a90b
101 584
5.2 Detailed use cases
3dce2353f126104d8050256e4223a90b
101 584
5.2.1 Use Case 1 - Home Control
3dce2353f126104d8050256e4223a90b
101 584
5.2.1.1 General Use Case Description
This use case demonstrates co-operation between two independent M2M applications. The co-operation is made possible because one application can find the other application through semantic information about the application's resources. This semantic information is available in the M2M System. One application is a buildi...
3dce2353f126104d8050256e4223a90b
101 584
5.2.1.2 Stakeholders
• Building manager: is running a Building management system (BMS) for his apartment house. • Tenant of an apartment: has subscribed to a home energy management system (HEMS) for his apartment. • M2M service provider: is providing access to the M2M System for both applications, BMS and HEMS. Building management system (...
3dce2353f126104d8050256e4223a90b
101 584
5.2.1.3 Pre-conditions
The Building management system (BMS) is an M2M application that contains all the information needed to manage a large apartment house. In particular it contains the construction details of the tenant's apartment, where the doors and windows are located, where the heaters are, their capacity, etc. The BMS is used for ov...
3dce2353f126104d8050256e4223a90b
101 584
5.2.1.4 Flow of the use case
The newly subscribed HEMS will immediately start discovering new devices in the apartment. Once the BMS has granted access, the HEMS will discover the resources of the BMS that are related to the apartment. Using the semantic description of the devices the HEMS can immediately find out about the available rooms, heater...
3dce2353f126104d8050256e4223a90b
101 584
5.2.1.5 Post-conditions
None. ETSI ETSI TR 101 584 V2.1.1 (2013-12) 22
3dce2353f126104d8050256e4223a90b
101 584
5.2.1.6 Potential new requirements from this use case
• M2M system support for a common (e.g. per vertical domain) semantic data model (e.g. represented by Ontology) available to M2M application. • M2M system provision of discovery capabilities enabling the discovery of M2M resources based on their semantic information, e.g. semantic categories and relationship among them...
3dce2353f126104d8050256e4223a90b
101 584
5.2.2 Use Case 2 - Device plug and play
3dce2353f126104d8050256e4223a90b
101 584
5.2.2.1 General Use Case Description
This use case applies with any verticals, below just take home automation as an example. The use case is about when a device is newly registered in a home, it will find its own character and its relationship with its neighbour devices and Things automatically based on semantic information within the M2M system without ...
3dce2353f126104d8050256e4223a90b
101 584
5.2.2.2 Stakeholders
• Home automation service provider: is providing home automation service by providing applications running on home automation devices such as gateway, lamp, switch, TV, air-condition etc. • Home automation management system (HAMS): is a network application. • Device manufacturer: produces devices as M2M nodes. • M2M se...
3dce2353f126104d8050256e4223a90b
101 584
5.2.2.3 Pre-conditions
The house owner has a contract with the home automation service provider for the home automation service. The home automation service provider has a business relationship with the M2M service provider and the device manufacturer. The home automation management system manages all the devices and their relationships regi...
3dce2353f126104d8050256e4223a90b
101 584
5.2.2.4 Flow of the use case
When the house owner buys new devices for his house, the newly bought devices will register to the M2M service provider and expose to the M2M SP its role and functionalities including their semantic descriptions. According to such information, the HAMS will compare the semantic description of the new device with the se...
3dce2353f126104d8050256e4223a90b
101 584
5.2.2.5 Post-conditions
None. ETSI ETSI TR 101 584 V2.1.1 (2013-12) 23
3dce2353f126104d8050256e4223a90b
101 584
5.2.2.6 Potential new requirements from this use case
• M2M system support of a semantic data model that is at least common to the vertical industry in which a Thing is used to describe Things registered in the M2M System. • M2M entities ablility to expose their semantic description to the M2M System. • M2M System ability to re-use semantic information provided by externa...
3dce2353f126104d8050256e4223a90b
101 584
6 Summary of all potential requirements
• M2M system support for a common (e.g. per vertical domain) semantic data model (e.g. represented by Ontology) available to M2M application. • M2M system provision of discovery capabilities enabling the discovery of M2M resources based on their semantic information, e.g. semantic categories and relationship among them...
3dce2353f126104d8050256e4223a90b
101 584
7 Potential architecture alternatives
3dce2353f126104d8050256e4223a90b
101 584
7.1 Device Abstraction
3dce2353f126104d8050256e4223a90b
101 584
7.1.1 Architecture
Native devices (type d) can host several applications. For example, a ZigBee® device can have several on/off switches. Each switch is a distinct application and needs to be registered to the Gateway as well as the Network. As specified in the TS 102 690 [i.10] clause 6.1, the GIP capability provides interworking betwee...
3dce2353f126104d8050256e4223a90b
101 584
7.1.2 Interworking with legacy devices (d) through abstract devices
Figure 7 provides a resource-entity model that represents an M2M area network. In this model, each device in the network has native data and methods which are provided via access network-specific interfaces to applications. In order to provide interworking with M2M network applications that do not understand access spe...
3dce2353f126104d8050256e4223a90b
101 584
7.1.2.1 Native Resource
Native resource is an Application resource specified in the TS 102 690 [i.10] that will store network specific information about the Application. Same as application resource, native resource is created as a result of successful registration of an Application with the local SCL. M2M network applications that understand...
3dce2353f126104d8050256e4223a90b
101 584
7.1.2.2 Abstract Resource
An abstracted resource will point to the native resource hosted in another SCL or in the same SCL. The abstracted resource is a virtual resource which consists of a set of generalized attributes instead of local area network specific attributes, such as, the searchStrings, the abstractLink to the original resource, a s...
3dce2353f126104d8050256e4223a90b
101 584
7.1.3 Gateway Resource Abstraction (GRA) capability
At start-up of forming a local area network, the GIP capability detects new devices that have joined the network and creates original M2M resources on GSCL, which are specific to the local network technology. When the GIP capability creates the original resources, the GRA capability detects new resources, creates their...
3dce2353f126104d8050256e4223a90b
101 584
7.1.4 Subscription of Abstract Resources
Any xA in the ETSI M2M architecture should be able to create a subscription to an abstract resource. The xSC is responsible for managing the subscription. Any xA that subscribes to an attribute value can be notified when the value changes. ETSI ETSI TR 101 584 V2.1.1 (2013-12) 27 Figure 8: Linking an abstract resource ...
3dce2353f126104d8050256e4223a90b
101 584
7.1.5 Mapping Principle
This clause describes the mapping principles that are used to map a generic M2M abstract resource into a native M2M resource. Each abstract application belonging to a Device (N.B.: they are not ETSI M2M Applications) is modelled with an ETSI M2M <abstract-application> resource. The URI used to access this <abstract-app...
3dce2353f126104d8050256e4223a90b
101 584
7.1.6 Abstract Resource Management (Add/Remove/Replacement)
Adding an abstract resource to an existing network is performed through the GRA capability. When a new native device is detected and added by the GIP capability, the GRA capability communicates with the GIP and initiates device abstraction to add a corresponding abstract device to the GSCL as well as NSCL. In the ETSI ...
3dce2353f126104d8050256e4223a90b
101 584
8 Conclusions
For ETSI M2M Release 1 no semantic support is planned. ETSI ETSI TR 101 584 V2.1.1 (2013-12) 29 Annex A: Application design support for semantic M2M data WI A.1 References ETSI TC M2M technical specifications, Release 1. A.2 Application design The development of business applications able to deal with ETSI M2M SCLs ser...
341d91553e6a7e4a12e15fdf98b6f402
101 641
1 Scope
The present document gives background information on the performance of the GSM half rate speech codec. Experimental results from the characterization and verification tests carried out during the selection process by the Traffic CHannel Half rate Speech (TCH-HS) expert group are reported to give a more detailed pictur...
341d91553e6a7e4a12e15fdf98b6f402
101 641
2 References
The following documents contain provisions which, through reference in this text, constitute provisions of the present document. • References are either specific (identified by date of publication, edition number, version number, etc.) or non- specific. • For a specific reference, subsequent revisions do not apply. • F...
341d91553e6a7e4a12e15fdf98b6f402
101 641
3 Abbreviations
For the purposes of the present document, the following abbreviations apply: A/D Analogue to Digital ACR Absolute Category Rating ANOVA ANalysis Of VAriance C/I Carrier-to-Interferer ratio CEPT Conférence Européenne des Postes et Télécommunications CNI Comfort Noise Insertion D/A Digital to Analogue DAT Digital Audio T...
341d91553e6a7e4a12e15fdf98b6f402
101 641
6 Quality under tandeming conditions
341d91553e6a7e4a12e15fdf98b6f402
101 641
6.1 Quality under tandeming conditions, Experiment 3
A listening-only test was chosen, adopting the Absolute Category Rating (ACR) method. Subjective tests were carried out by BT (United Kingdom), CSELT (Italy), and DEUTSCHE TELEKOM (Germany). Table 3 reports the results obtained in Experiment 3: each cell shows the difference in terms of equivalent Q values between the ...
341d91553e6a7e4a12e15fdf98b6f402
101 641
6.2 Effect of tandeming with other standards, Experiment 7
The experiment was conducted in two different laboratories: BT (UK) and CNET (France). The following standards were tandemed with the half rate codec in this experiment: half rate, full rate, ITU-T Recommendation G.726 [2] (at 32 kbit/s) and G.728 [3]. Both possible orders of tandeming were tested for each of these cas...
341d91553e6a7e4a12e15fdf98b6f402
101 641
7 Quality under background noise conditions
341d91553e6a7e4a12e15fdf98b6f402
101 641
7.1 Experiments 4 and 5
International subjective test programs have been conducted in the past, by both the ITU and ETSI, to investigate the effects of environmental noise. This has proved to be a difficult area to evaluate, and more satisfactory methodologies are continually being sought to improve the accuracy of these tests. Several method...
341d91553e6a7e4a12e15fdf98b6f402
101 641
7.2 Special background noise
341d91553e6a7e4a12e15fdf98b6f402
101 641
7.2.1 Introduction
Some informal listening sessions were carried out to further investigate background noise effects. Speech samples from four different talkers were electronically mixed (at 3 different Signal-to-Noise Ratios; 5 dB, 10 dB, and 20 dB) with a wide range of different background noises, reflecting the following types of envi...
341d91553e6a7e4a12e15fdf98b6f402
101 641
7.2.2 Observations
At the lower Signal-to-Noise Ratios, the speech was often unintelligible without considerable concentration and effort on the part of the listener. In some cases, even where the listener was familiar with the speech material, it was impossible to understand some parts of the speech. The codec had the effect of making t...
341d91553e6a7e4a12e15fdf98b6f402
101 641
8 Assessment of equivalent qdu, Experiment 6
The experiment on the assessment of qdu was designed to assess the half rate codec performance, in error free conditions, in terms of Equivalent Quantization Distortion Units (qdu) as defined by the ITU-T. Two laboratories performed the experiment (CSELT and DEUTSCHE TELEKOM) and the following conclusions were drawn fr...
341d91553e6a7e4a12e15fdf98b6f402
101 641
9 Talker dependency, Experiment 8
From the results obtained in the two laboratories which conducted this experiment, the performance of any given condition undoubtedly varies from talker to talker. The existence of this talker dependency has been confirmed by a further analysis applied to the results from the first phase of characterization testing. Un...
341d91553e6a7e4a12e15fdf98b6f402
101 641
10 DTX System
341d91553e6a7e4a12e15fdf98b6f402
101 641
10.1 Assessment of DTX algorithm, Experiment 9
The four laboratories who performed the subjective evaluation of DTX functions concentrated their expert listening on the following effects, using conversational speech; - Voice Activity Detection (VAD); and - Comfort Noise Insertion (CNI). For this, the speech material available was monitored for the following effects...
341d91553e6a7e4a12e15fdf98b6f402
101 641
10.2 Channel activity in DTX mode
341d91553e6a7e4a12e15fdf98b6f402
101 641
10.2.1 Test procedure
Speech material recorded during testing of the full rate DTX system was processed through the codec/DTX hardware. This material comprised real conversations in the English, French, German and Italian languages. The activity of the VAD algorithm was measured for all 480 conversations. The mean channel activity was then ...
341d91553e6a7e4a12e15fdf98b6f402
101 641
10.2.2 Speech channel activity
The percentage of speech frames scheduled for transmission by the radio sub-system (subsequently referred to as the speech channel activity) varied significantly between conversations. Speech channel activities ranged from 35 % to 85 % for individual sides of a conversation. For this reason, it was not possible to iden...
341d91553e6a7e4a12e15fdf98b6f402
101 641
10.2.3 Level compensation
During the expert listening, it was found that the speech material had been processed at a level 6,5 dB below the original recorded level. However, the activity of the basic VAD algorithm rises approximately 0,5 % per dB increase in input level. To compensate for this, a factor of 3 % must be added to the speech channe...
341d91553e6a7e4a12e15fdf98b6f402
101 641
10.2.4 SID update rate
The DTX handler simulation used a SID update period of 480 ms. The SID update rate has subsequently been reduced to 240 ms. This modification will raise the speech channel activity by approximately 2 %.
341d91553e6a7e4a12e15fdf98b6f402
101 641
10.2.5 Interleaving compensation
The channel measurements were calculated on a signal frame basis. However, the use of interleaving (depth 4) implies that the TDMA activity will be approximately 2 % higher than the signal frame activity.
341d91553e6a7e4a12e15fdf98b6f402
101 641
10.2.6 Estimated mean TDMA channel activity
The estimated mean TDMA channel activity is shown in table 6. Table 6: Calculation of mean TDMA channel activity speech channel activity 55 % level compensation 3 % 240 ms SID update period 2 % interleaving compensation 2 % total TDMA channel activity 62 % ETSI ETSI TR 101 641 V8.0.0 (2000-06) 15 (GSM 06.08 version 8.0...
341d91553e6a7e4a12e15fdf98b6f402
101 641
11 Performance with DTMF tones
341d91553e6a7e4a12e15fdf98b6f402
101 641
11.1 Introduction
In the fixed telephone system, DTMF (Dual Tone Multi Frequency) signals are transmitted in the speech channel for signalling. This has led to the use of DTMF tones for applications such as the control of answering machines and mail/messaging boxes. In the GSM system, the handling of these signalling tones is dependant ...
341d91553e6a7e4a12e15fdf98b6f402
101 641
11.2 Test set-up
16 DTMF signals are defined representing the 10 numeric keys, the characters "A", "B", "C", "D", "*" and "#". Each digit consists of two sine signals of distinctive frequencies, one chosen out of 4 values from the low frequency group (or row frequency), and one out of the 4 values from the high frequency group (column ...
341d91553e6a7e4a12e15fdf98b6f402
101 641
11.3 Results
The results of the test with a standard DTMF detector are shown in table 7. Even at ideal conditions with nominal DTMF signal frequencies, no additional signals in the speech band, and error free transmission, the recognition is poor after processing. Only with a relatively high level of -12 dB and a tone length of 80 ...
341d91553e6a7e4a12e15fdf98b6f402
101 641
11.4 Conclusions
With the standard detector the recognition rate averaged over all experiments was 74 %. The tuning of the detector for the half rate channel characteristics could improve the detection rate to 92 %. As all experiments still had rather ideal conditions, in real application an even lower rate for detection has to be assu...
341d91553e6a7e4a12e15fdf98b6f402
101 641
12 Performance with signalling tones
The capability of the codec to transmit network information tones was assessed with 5 French signalling tones following the IUT-T recommendation: "Warn" tone, "Busy" tone, "Ring" tone, "Inf" tone and "Pay" tone (tones of length 200 ms to 1s and silences between tones of length 30 ms to 4 s). ETSI ETSI TR 101 641 V8.0.0...
341d91553e6a7e4a12e15fdf98b6f402
101 641
13 Delay
[tbd]
341d91553e6a7e4a12e15fdf98b6f402
101 641
14 Frequency response
The frequency response of the GSM half rate codec, has been evaluated by computing the logarithmic gain. The codec has been tested in error free condition only, without DTX associated, by independently processing 198 sine waves files spaced by 20 Hz and spanning the range between 50 to 3 990 Hz. Each file had a duratio...
341d91553e6a7e4a12e15fdf98b6f402
101 641
15 Half Rate codec complexity
The complexity of the half rate codec is characterized by the 3 following items: - the number of cycles; - the data memory size; - the program memory size. The values of these different figures depend on a specific DSP implementation. Nevertheless, the results obtained by the C description analysis can be used as refer...
341d91553e6a7e4a12e15fdf98b6f402
101 641
16.1 Summary of Results From Characterization Phase 1
The whole set of individual and global data were extensively analysed and discussed within the TCH-HS expert group. The effects of different factors and their interactions were subject to analysis of variance (ANOVA). Tables 10 to 14 report the results obtained in 9 experiments. ETSI ETSI TR 101 641 V8.0.0 (2000-06) 20...
341d91553e6a7e4a12e15fdf98b6f402
101 641
16.2 Summary of Results From Characterization Phase 2
Table 14: Summary of Characterization Phase 2 Results (Experiment 6 to Experiment 9) Subject: qdu Tandeming with other Standards Talker Dependency DTX Functions Laboratory Experiment 6 Experiment 7 Experiment 8 Experiment 9 BT HR+any < any+HR see clause 9 DTX operation appears to be satisfactory. CNET HR+any < any+HR D...
341d91553e6a7e4a12e15fdf98b6f402
101 641
16.3 Conclusion
A subjective test methodology for the quality assessment of ETSI's half rate algorithm has been implemented, based on listening opinion tests. The test methodology reflected international telephony assessment methods that are described extensively in the ITU-T Series P Recommendations, and that have shown to be suitabl...
62096ab52484b380fd087fbbc5b51798
101 578
1 Scope
The present document focuses on Quality of Service (QoS) measurements for IP-based video services with reliable transport where downloading and viewing takes place in parallel. In principle the presented measurement approach can be used for all video services, where the video is embedded in a HTML context as of video o...
62096ab52484b380fd087fbbc5b51798
101 578
2 References
62096ab52484b380fd087fbbc5b51798
101 578
2.1 Normative references
Normative references are not applicable in the present document.
62096ab52484b380fd087fbbc5b51798
101 578
2.2 Informative references
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks i...
62096ab52484b380fd087fbbc5b51798
101 578
3 Abbreviations
For the purposes of the present document, the following abbreviations apply: CPU Central Processing Unit DASH Dynamic Adaptive Streaming over HTTP DNS Domain Name System FLV Flash® Video FTP File Transfer Protocol GPU Graphics Processing Unit HDD Hard Disk Drive HLS HTTP Live Streaming HTML HyperText Markup Language HT...
62096ab52484b380fd087fbbc5b51798
101 578
4.0 General
Many video services offer the videos in several resolutions and allows the viewer to select the resolution quality manually. However, most services apply an adaptive mode (called 'automatic' for YouTube™), where based on the transport channel performances or other information the chosen resolution (bitrate) and the Pre...