Integration of Negative Emotion Detection into a VoIP Call Center System

Size: px
Start display at page:

Download "Integration of Negative Emotion Detection into a VoIP Call Center System"

Transcription

1 Integration of Negative Detection into a VoIP Call Center System Tsang-Long Pao, Chia-Feng Chang, and Ren-Chi Tsao Department of Computer Science and Engineering Tatung University, Taipei, Taiwan Abstract - The speech signal itself contains not only the semantics of the spoken words but also the emotion state of the speaker. By analyzing the voice signal to recognize the emotion hidden in the speech signal, it is possible to identify the emotion state of the speaker. With the integration of a speech emotion system into a VoIP call center system, we can continuously monitor the emotion state of the service representatives and the customers. In this paper, we proposed a framework that integrates the speech emotion system into a VoIP call center system Using this setup, we can detect in real time the speech emotion from the conversation between service representatives and customers. It can display the emotion states of the conversation in a monitoring console and, in the event of a negative emotion being detected, issue alert signal to the service manager who can then promptly react to the situation. Keywords: Speech Recognition, Call Center, Negative Detection, WD-KNN Classifier 1 Introduction The voice signal in the conversation represents the semantics of the spoken words and also the emotion state of the speaker. If a dispute happened between the service representative and the customer, there is no way to notify the service manager to take action immediately in current call center system. Since the customer service is playing an important role for an enterprise, the customer satisfaction is very important. So, the management of customer service department to improve the customer satisfaction is an important issue for the enterprise. Traditional customer service lacks of the ability in issuing alerts for conversation with negative emotion in realtime. For example, when the customer disagrees with the service representative, a dispute may arise. The traditional call center handles a large amount of calls every day and will usually make recording of all the calls for later analysis to see whether there is any improper conversation or not. However, these setups cannot handle the dispute situation in a timely manner. A considerable number of studies have been made on speech emotion over the past decades [1-16]. By integrating the speech emotion system into the VoIP call center system, we can continuously monitor the emotional state of the service representatives and the customers. In this paper, we propose the mechanism to integrate the negative emotion detection engine into the VoIP call center system. A parallel processing architecture is implemented to meet the performance requirements for the system. We also record the emotion states for all of the calls into the database. Alerts will be issued to the service manager whenever a negative emotion such as anger is being detected. The service manager has a chance to intervene into the two quarreling parties to pacify the customer and resolve the problem immediately. With this mechanism, it can enhance the level of customer satisfaction. The organization of this paper is as follows. In Section 2, the background and the related researches of speech emotion and voice over Internet Protocol (VoIP) are reviewed. In Section 3, the system architecture of a multi-line negative emotion detection in VoIP Call Center is described. In Section 4, the experimental setup is presented and the results are discussed. Conclusions are presented in Section 5. 2 Backgrounds 2.1 Speech Recognition In the past, quite a lot of researchers studied the human emotion and try to define what an emotion is. But it is hard to define emotional category because of there is no a single universally agreed definition. The emotion category defined by Ortony and Turner is a commonly accepted definition [10]. In recent years, the study of psychological tends to divide emotion category into basic emotion and complex emotion. The complex emotion is a derived version from the basic emotion in their definition. In addition to the semantics of spoken word, the speech signal also carries information of the emotion state of the speaker. That is, inside the speech signal, there are features that are related to the emotion state at the time of making that speech. By analyzing these features, it is possible to classify the emotion categories with a suitable classifier.

2 Features related to speaking rate, signal amplitude, frequency, itter, and formant are being studied in the speech emotion researches. [1-4]. In previous studies of emotion, there are several aspects that are being addressed. Some of the studies tried to find the most relevant acoustic features to the emotion inside the speech signal [13-16]. Searching for the most suitable machine learning algorithms for the classifier is also a topic that attracted quite a lot of attention [7][9-12]. In most of the previous studies, short speech corpora are used in the experiments. However, in this research, we need to deal with the continuous speech, which is long in nature. Therefore, we need to find a way to properly segment the speech signal and categorize the emotion such that burst misclassification will not affect the accuracy of the udgment. The corpus is a set of a large collection of utterance segments. A corpus plays an important role in the emotion research. In this paper, the D80 corpus built in the previous studies is used. We use the D80 to train our emotion engine. The speech corpus was collected from 18 males and 16 females who were given 20 scripts and were asked to speak out in five emotions including anger, boredom, happiness, neutral and sadness for each of them. A subective test is performed and those utterances with over 80% agreement were kept. After this process, there are 570 utterances left. The number of utterances in each emotion categories in the D80 corpus is 151 for anger, 83 for boredom, 96 for happiness, 116 for neutral, and 124 for sadness. A considerable number of previous studies have been made on feature selection in order to improve the accuracy of the emotion. The core of the feature selection is to reduce the dimension of the feature set to a smallest feature combination that yields the highest accuracy. The speech features commonly used in previous emotion researches include Formants (F1, F2 and F3), Shimmer, Jitter, Linear Predictive Coefficients (LPC), Linear Prediction Cepstral Coefficients (LPCC), Mel-Frequency Cepstral Coefficients (MFCC), first derivative of MFCC (dmfcc), second derivative of MFCC (ddmfcc), Log Frequency Power Coefficients (LFPC), Perceptual Linear Prediction (PLP), and Zero-Crossing Rat (ZCR). According to previous studies, the MFCC is the commonly used feature for the emotion [13]. Therefore, we choose the MFCC feature as the acoustic feature as input to the classifier input in this research. In the machine learning, the purpose of a classifier is to classify obects with similar characteristics into the same class. The classification can be divided into two types, supervised (e.g. KNN) and unsupervised (e.g. k-means). In this research, we used the Weighted D-KNN (WD-KNN) classifier, which is a variant of KNN and is proposed in [11]. The KNN is a classification algorithm that assigns the test sample to a class based on the distance between test sample and k-nearest training samples. The WD-KNN extends the KNN by comparing the weighted distance sum to maximize the classification accuracy. The weight calculation is to assign a higher weight to neighbors that provide more reliable information. For an M-class classification using KNN, let the k neighbours nearest to unknown test sample y be N k (y), and c(z) be the class label for training sample z. The subset of 1L,, M is the nearest neighbours in class { } k k = N ( y) = { z N ( y); c( z) } (1) If we denote the cardinality (the number of elements) of the set N k (y) as ( y) N k. Then the classification of y belonging to class * is the maority class vote, that is: * = arg max{ ( y) } (2) For WD-KNN classification, we need to select k nearest neighbors from each class. Let denotes the Euclidean distance between the i th nearest neighbor in class to unknown sample y. The distance measure is in ascending order, that is di di+ 1. The weighted distance sum for sample y to all the k nearest neighbors in class will be D = k i= 1 N k i i w d where w i w i+ 1 for all i. As discussed in [11], the best rate could be obtained by using a weighting in the reverse ordered Fibonacci sequence, which is: di (3) w w + w w = w 1 (4) i = i+ 1 i+ 2, k 1 k = The classification of y belonging to class * is the class with the shortest weighted distance * = arg min{ D } (5) As a conclusion, the speech emotion is a system that takes the voice signal as input and then recognizes the emotion of the speaker at the instance of making that speech. From the extracted features, the most likely emotion was udged by using a classification algorithm. The block diagram of a speech emotion system is shown in Figure 1. In this system, the

3 selected features were extracted and sent to the classifier to determine the most probable emotion of that segment. al Speech Feature Database Preprocessing Feature Extraction Classification Evaluation Result Figure 1. Block diagram of emotion system 2.2 VoIP Telephony and Packet Capture Techniques VoIP or known as IP phone is a technology that uses internet to accomplish telephone communication. The IP phone was used internally in the enterprise in the past. However, owning to the rapid grown of internet, the IP phone is now widely adopted and is gradually replacing the traditional telephone communication system. Currently, the commonly used VoIP communication protocol is the Session Initiation Protocol (SIP). The SIP is a protocol developed by IETF MMUSIC which is used in the establishment, modification and termination of an interactive call session. Possible applications include voice and video communication, instant messaging, online game, virtual reality and other multimedia applications. The purposes of SIP are to define the format and the control of the packets transmitted over the internet. The packet capture tool used in this study is WinPcap. WinPcap is a tool for link-layer network access in Windows environments. It includes kernel-level packet filter, a dynamic link library (packet.dll) and a high-level and system-independent library. It can be used in win32 platform to capture network packets. WinPcap consists of a driver that facilitates the operating system to access the lowlevel networks. WinPcap also provides a library that can be used easily to access the low-level network layers by the application programs. In addition, the kernel of WinPcap also provides packet filtering. Through the filter setting, the driver will directly discard unwanted packet in driver layer. The performance of the packet filter is good. Hence it is now widely used in a lot of software such as WireShark. 3 System Architecture In this paper, we proposed a framework that integrates the speech emotion system into a VoIP call center system. The components of the system are shown in Figure 2. The customer and the service representative communicate with each other through the VoIP phones. We defined session as the conversation between the pair of the customer and the service representative. We use a layer 2 switch to mirror packets going in and out from the IP PBX into our packet capture agent. Then, we identify the session and assign the session with a Session ID (SID) if it is new. After the session is established, we extract the voice signal from the RTP packets captured and regroup it into proper segments. The speech emotion system will be activated to classify the emotion of each segment. Finally, the result will be stored into a database. The system will issue an alert whenever a negative emotion, mainly anger, is detected. The SIP is a point to point protocol. Using a distributed architecture, the SIP transmits the text-based information and names the address by URL. The SIP use similar syntax as some protocols used in the internet such as HTTP and SMTP which consist of headers and message body. There are two types of SIP operations for the client connection, one is to connect the two clients in a point to point manner, and the other is to connect the party though a proxy server. In this research, we adopt proxy server configuration to simplify the packet capture process. The IP PBX (IP Private Branch exchange) works as the proxy server and plays the role of packet relaying. We capture the packets in and out from the IP PBX by port mirroring from the switch the server connected to. Figure 2. Components of the proposed system The operation steps of system are shown in Figure 3. First, the system will capture the packets and filter out the SIP and RTP packets. The Speech Recognition System (SERS) will assign a Session ID (SID) according to the phone number of the service representative and

4 customers. Then, the speech segment will be sent to the emotion engine to classify the emotion state. Finally, the classification results will be stored into database. The service manager acquires the all the results using a web page interface. The system will issue alert to service manager when the negative emotion is detected. Packet capture Session identification Voice data reconstruction Database Figure 3. Operations of the speech emotion 3.1 Packet Capture and Session Identification The packet is the smallest unit in network communication. Packets are transmitted across the internet through a series of switches and routers. A packet consists of a header and a payload. The header has the control information for the transmission of packets. The control information includes source and destination IP addresses, source and destination ports, etc. In our experiment environment, all of the VoIP packet will pass through the SIP proxy server. In this framework, we can use a mechanism called port mirror in the layer 2 switch to mirror the packets in and out of the SIP server. Then, we can capture the packets and analyze its content easily. In the call center, each phone line is independent. But once the call is established, the phone number will not change during the call. So, the identification of a session is necessary for storing the captured RTP packet to the correct pair of conversation. We build a session obect to manage the session. The session obect include source IP, setup time, speech coding and used buffers. We create a session obect when a session start and we will remove the session obect when the phone call ends. In order to implement multi-line packet capture, we need to identify the source and destination IP address of the packet first. According to the information, we assign a session ID to the session, and then allocate the storage for storing the session ID and related information. 3.2 Recognition Engine Negative emotion detection Alert To integrate emotion function into the VoIP call center system require further effort then the speech emotion. Some attempts have been made by scholars to use the combination of multiple speech features to increase the accuracy of speech emotion. However, in order to process multi-line voice segment simultaneously in real-time, the engine needs to reduce the computational complexity. From previous studies, the MFCC feature has been proven to be one of the most robust features in emotion [12]. So we choose to use only the MFCC in the emotion. We use the WD-KNN to be our classifier. In order to process multi-line voice segment, we may need more than one computer to perform the speech. We design a mechanism to share the load among several speech emotion engines. Virtual machine architecture is used to fully utilize the computing power of a high performance server. With this framework, we can distribute the voice segment to each virtual machine in turn. The parallel processing mechanism can resolve the bottleneck problem due to the high computational resource required by the engine. 3.3 Negative Detection In the D80 corpus, there are five basic emotion categories. We further divided them into positive and negative class. The positive emotion includes happiness and neutral, and the negative emotion includes anger, sadness and boredom. In this paper, we focus on detecting the anger emotion incurred in the conversation between the service representative and customer. The system will issue an alert whenever the anger emotion being detected during the conversion between the service representative and the customer. To decrease the false alarm rate, a score board udgment mechanism is implemented. The score board is zero at the beginning of a session. When the emotion result is anger, the score board will increase by 4 points. The score board will decrease 1 point when no anger emotion is detected for a voice segment if the score is positive. The system will confirm the anger emotion when the score exceed the threshold. An alert flag will be written to database whenever the score exceed the threshold. An alert message will be sent to the service manager through a web page interface whenever alert flag is being set. 4 Experiments and Result Discussion 4.1 Experimental Setup The proposed system consists of three subsystems. The detail description of each subsystem will be presented in this section. The framework of the proposed system is shown in Figure 4.

5 Packet capture & Session identification File system Figure 4. Framework of the proposed system The Asterisk IP PBX server is installed in a Linux platform. In this research, we assign the SIP ID 1xx as the phone number for customers, SIP ID 4xx for the service manager, and SIP ID 6xx for the service representatives. The SIP phone is configured in the proxy mode, such that all the SIP and RTP related communication packets between the customer and the service representative will pass through the IP PBX. With this configuration, we can capture all the SIP and RTP packets by mirroring the traffic going into the server from the Layer 2 switch where the server is attached. The session information is stored in a table structure. When a new SIP or RTP packet is received, the packet capture module will capture the packet, analyze the content of header and compare it with the contents in the session table. If it is a new session, the system will create a new session identifier and assign a new session ID to it; otherwise the existing session ID will be retrieved. 4.2 Recognition engine 1 engine... 2 engine N Alert Negative emotion detection Database We capture the voice signal from the conversation between the customer and service representative. The voice we captured will be regrouped into sound file in WAV format with 1 second in duration each. We will send the segmented voice file into the speech engine, and the engine will output the result. In order to increase the performance of the emotion engine, we use a parallel architecture to build our system. We setup several machines and install the engine written in MATLAB into each machine. By using this structure, the bottleneck problem of the speech emotion system can be avoided. The output from each engine is stored into a database. The results are analyzed by using the score board algorithm stated above to determine whether the anger emotion exists in the conversation or not. 4.3 Testing Samples A six scripts corpus was recorded by inviting volunteers to speak out the scripts with emotion as they like. Each corpus is tagged subectively by human udge. Only the results with more than 80% agreement in this process are kept. The emotion of human seems to change gradually. So we use the score board concept to determine whether or not an anger emotion was occurred in the conversation between the customer and the service representative. In our environment, we set the score to 0 at the beginning. If a negative emotion is being detected, the system will add 4 points to the corresponding session, or otherwise the system will subtract 1 point from that session if the score is positive. In order to reduce the false negative emotion rate, a threshold should be set. We test several threshold values, including 4, 8, 12, and 16, to check the accuracy. We compare the emotion results with human udge for the chosen threshold. The result of the negative emotion detection is listed in Table 1. Table 1. Number of detected negative emotion with different threshold T. Human Judge T=4 T=8 T=12 T=16 T=20 Script Script Script Script Script Script In Table 1, the negative emotion detection results are close to the human udge when the threshold is 16 except the script 3 and 5. For script 3, the content of the script consist of a lot of happy sentence. It is hard to differentiate between happiness and anger in a speech emotion system since they are both in the activation category. For script 5, the content of the script consists of continuous negative emotion. Due to the score board architecture, it is hard to count the dispute correctly. The advantage of the score board framework is that it can reduce the udgment error. But it cannot count the dispute exactly. For the negative emotion detection as mentioned above, the most important thing is to issue an alert when the dispute happened. The frequency of the dispute is not an important issue in this research. 5 Conclusions The call center plays an important role for an enterprise. It is obviously that collects the opinion from the customer

6 and pacify the customer if he or she is too agitated is important for the enterprise. To improve the quality of the service of the call center, we can integrate a negative emotion detection mechanism into the call center system. When a service representative faces too many angry customers, the call distribution system can reduce the number of calls to that representative to avoid the representative running into angry state. In this paper, we propose and implement the frameworks which can handle multi-line phone call with negative emotion detection capability. We modularize the system components that make the system more flexible. We develop the subsystem individually which includes packet capture and analysis, emotion, result recording, and negative emotion detection. In the part of emotion, we adopt the parallel architecture to avoid the possible bottleneck problem. By the combination of these subsystems, we build a system that can detect negative emotion from the conversation and issue an alert to service manager accordingly. Consequently, this system can improve the service quality of a call center because of the service manager has a chance to intervene to resolve the problem immediately. Acknowledgement The authors would like to thank the National Science Council (NSC) for financial support of this research under NSC proect No: NSC E References [1] H. Altun and G. Polat, Boosting selection of speech related features to improve performance of multi-class SVMs in emotion detection, Expert Systems with Applications, 36, , 2009 [2] C. Busso and S. S. Narayanan, Between Speech and Facial Gestures in al Utterances: A Single Subect Study, IEEE Transactions on Audio, Speech, and Language Processing, Vol. 15, No. 8, pp , [3] C. Busso, S. Lee, and S. Narayanan, Analysis of ally Salient Aspects of Fundamental Frequency for Detection, IEEE Transacations On Audio,Speech, And language Processing, Vol. 17, No. 4, pp , May [4] M. Cernak and C. Wellekens, al aspects of intrinsic speech variabilities in automatic speech, International Conference on Speech and Computer, , 2006 [5] Z. J. Chuang and C. H. Wu, Multi-Modal Recognition from Speech and Text, International Journal of Computational Linguistics and Chinese Language Processing, pp. 1-18, Vol. 9, No. 2, [6] R. E. Cowie, E. Douglas-Cowie, N. Tsapatsoulis, G. Votsis, S. Kollias, W. Fellenz, and J. Taylor, Recognition in Human-Computer Interaction, IEEE Signal Processing Magazine, Vol. 18, No. 1, pp , [7] X. Jin and Z. Wang, An Space Model for Recognition of s in Spoken Chinese, First International Conference on Affective Computing and Intelligent Interaction, pp , [8] M. Lugger and B. Yang, Extracting voice quality contours using discrete hidden Markov models, Proceedings of the Speech Prosody, 2008 [9] T. Nwe, S. Foo, and L. De Silva, Speech emotion using hidden Markov models, Journal of Speech Communication, 41(4), , 2003 [10] Ortony and T. J. Turner, What's Basic about Basic s, Psychological Review, pp , [11] T. L. Pao, Y. M. Cheng, Y. T. Chen & J. H. Yeh, Performance Evaluation of Different Weighting Schemes on KNN-Based Recognition in Mandarin Speech, International Journal of Information Acquisition, Vol. 4, No. 4, pp , Dec [12] T. L. Pao, Y. T. Chen, Chen and J. H Yeh, Comparison of classification methods for detecting emotion from Mandarin speech, IEICE Transactions on Information and Systems, Vol. E91-D, no. 4, pp , April [13] T. L. Pao, Y. T. Chen, and J. H. Yeh, Recognition and Evaluation from Mandarin Speech Signals, International Journal of Innovative Computing, Information and Control (IJICIC), Vol.4, no. 7, pp , July [14] J. Rong, G. Li, and Y. P. Chen, (2009). Acoustic feature selection for automatic emotion from speech, Information Processing and Management, 45, , 2009 [15] D. Ververidis and C. Kotropoulos, C, Fast and accurate sequential floating forward feature selection with the Bayes classifier applied to speech emotion, Signal Processing, 88, , 2008 [16] B. Yang and M. Lugger, from speech signals using new Harmony features, Signal Processing, 90, , 2010

Emotion Detection from Speech

Emotion Detection from Speech Emotion Detection from Speech 1. Introduction Although emotion detection from speech is a relatively new field of research, it has many potential applications. In human-computer or human-human interaction

More information

Using UDP Packets to Detect P2P File Sharing

Using UDP Packets to Detect P2P File Sharing 188 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 27 Using UDP Packets to Detect P2P File Sharing Tsang-Long Pao and Jian-Bo Chen Tatung University, Taipei,

More information

Indepth Voice over IP and SIP Networking Course

Indepth Voice over IP and SIP Networking Course Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.

More information

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Test Cases Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:23-11-2007 SPBX

More information

Recognition of Emotions in Interactive Voice Response Systems

Recognition of Emotions in Interactive Voice Response Systems Recognition of Emotions in Interactive Voice Response Systems Sherif Yacoub, Steve Simske, Xiaofan Lin, John Burns HP Laboratories Palo Alto HPL-2003-136 July 2 nd, 2003* E-mail: {sherif.yacoub, steven.simske,

More information

Automatic Evaluation Software for Contact Centre Agents voice Handling Performance

Automatic Evaluation Software for Contact Centre Agents voice Handling Performance International Journal of Scientific and Research Publications, Volume 5, Issue 1, January 2015 1 Automatic Evaluation Software for Contact Centre Agents voice Handling Performance K.K.A. Nipuni N. Perera,

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

Performance of Various Codecs Related to Jitter Buffer Variation in VoIP Using SIP

Performance of Various Codecs Related to Jitter Buffer Variation in VoIP Using SIP Performance of Various Related to Jitter Buffer Variation in VoIP Using SIP Iwan Handoyo Putro Electrical Engineering Department, Faculty of Industrial Technology Petra Christian University Siwalankerto

More information

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

Session Initiation Protocol (SIP) The Emerging System in IP Telephony Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia

More information

Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP

Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP Voice over IP Andreas Mettis University of Cyprus November 23, 2004 Overview What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP 1 VoIP VoIP (voice over IP - that is,

More information

VOICE OVER IP AND NETWORK CONVERGENCE

VOICE OVER IP AND NETWORK CONVERGENCE POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it

More information

Two-Stage Forking for SIP-based VoIP Services

Two-Stage Forking for SIP-based VoIP Services Two-Stage Forking for SIP-based VoIP Services Tsan-Pin Wang National Taichung University An-Chi Chen Providence University Li-Hsing Yen National University of Kaohsiung Abstract SIP (Session Initiation

More information

Establishing the Uniqueness of the Human Voice for Security Applications

Establishing the Uniqueness of the Human Voice for Security Applications Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Establishing the Uniqueness of the Human Voice for Security Applications Naresh P. Trilok, Sung-Hyuk Cha, and Charles C.

More information

Gender Identification using MFCC for Telephone Applications A Comparative Study

Gender Identification using MFCC for Telephone Applications A Comparative Study Gender Identification using MFCC for Telephone Applications A Comparative Study Jamil Ahmad, Mustansar Fiaz, Soon-il Kwon, Maleerat Sodanil, Bay Vo, and * Sung Wook Baik Abstract Gender recognition is

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

This specification this document to get an official version of this User Network Interface Specification

This specification this document to get an official version of this User Network Interface Specification This specification describes the situation of the Proximus network and services. It will be subject to modifications for corrections or when the network or the services will be modified. Please take into

More information

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011 Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice

More information

(Refer Slide Time: 6:17)

(Refer Slide Time: 6:17) Digital Video and Picture Communication Prof. S. Sengupta Department of Electronics and Communication Engineering Indian Institute of Technology, Kharagpur Lecture - 39 Video Conferencing: SIP Protocol

More information

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab

More information

Question: 3 When using Application Intelligence, Server Time may be defined as.

Question: 3 When using Application Intelligence, Server Time may be defined as. 1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Voice over IP (VoIP) Overview. Introduction. David Feiner ACN 2004. Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples

Voice over IP (VoIP) Overview. Introduction. David Feiner ACN 2004. Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples Voice over IP (VoIP) David Feiner ACN 2004 Overview Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples Introduction Voice Calls are transmitted over Packet Switched Network instead

More information

NAT TCP SIP ALG Support

NAT TCP SIP ALG Support The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the

More information

A Scalable Multi-Server Cluster VoIP System

A Scalable Multi-Server Cluster VoIP System A Scalable Multi-Server Cluster VoIP System Ming-Cheng Liang Li-Tsung Huang Chun-Zer Lee Min Chen Chia-Hung Hsu mcliang@nuk.edu.tw {kpa.huang, chunzer.lee}@gmail.com {minchen, chhsu}@nchc.org.tw Department

More information

SIP : Session Initiation Protocol

SIP : Session Initiation Protocol : Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification

More information

Back Office Recorder 4iP Installation Guide Intelligent Recording Limited

Back Office Recorder 4iP Installation Guide Intelligent Recording Limited Back Office Recorder 4iP Installation Guide Intelligent Recording Limited Downloads Available at www.usbcallrecord.com UK Office +44 (0) 1909 512148 US Office +1 949.587.1226 Copyright Intelligent Recording

More information

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos (gss7@sfu.ca) (sna14@sfu.ca)

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

12 Quality of Service (QoS)

12 Quality of Service (QoS) Burapha University ก Department of Computer Science 12 Quality of Service (QoS) Quality of Service Best Effort, Integrated Service, Differentiated Service Factors that affect the QoS Ver. 0.1 :, prajaks@buu.ac.th

More information

Qfiniti Enterprise and VoIP for Avaya. Qfiniti Enterprise and VoIP. An etalk Technical White Paper

Qfiniti Enterprise and VoIP for Avaya. Qfiniti Enterprise and VoIP. An etalk Technical White Paper Qfiniti Enterprise and VoIP for Avaya Qfiniti Enterprise and VoIP An etalk Technical White Paper Table of Contents etalk Product Briefing...3 Integration Overview...3 VoIP Connection...4 Layer 2 Connectivity...4

More information

Chapter 4 Restricting Access From Your Network

Chapter 4 Restricting Access From Your Network Chapter 4 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the RangeMax NEXT Wireless Router WNR834B to protect your network. You can

More information

語 音 情 緒 辨 識 在 VoIP 客 服 系 統 上 的 應 用 Application of Speech Emotion Recognition in

語 音 情 緒 辨 識 在 VoIP 客 服 系 統 上 的 應 用 Application of Speech Emotion Recognition in 語 音 情 緒 辨 識 在 VoIP 客 服 系 統 上 的 應 用 Application of Speech Emotion Recognition in the VoIP Call Center 研 究 生 : 林 秋 煌 (Chou-Huang Lin) 指 導 教 授 : 包 蒼 龍 (Prof. Tsang-Long Pao) 大 同 大 學 資 訊 工 程 研 究 所 碩 士 論 文

More information

Unit 23. RTP, VoIP. Shyam Parekh

Unit 23. RTP, VoIP. Shyam Parekh Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP

More information

Lab Hours. We need to allocate 3 hours in this week for hands-on lab hours ( Nov 13 th 14:10-17:00).

Lab Hours. We need to allocate 3 hours in this week for hands-on lab hours ( Nov 13 th 14:10-17:00). Lab Hours We need to allocate 3 hours in this week for hands-on lab hours ( Nov 13 th 14:10-17:00). 17:00). The instructor will set up the SIP server. Every student will bring a labtop or desktop PC and

More information

Functional Specifications Document

Functional Specifications Document Functional Specifications Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:19-10-2007

More information

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation

More information

Encapsulating Voice in IP Packets

Encapsulating Voice in IP Packets Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au

More information

Keywords: VoIP calls, packet extraction, packet analysis

Keywords: VoIP calls, packet extraction, packet analysis Chapter 17 EXTRACTING EVIDENCE RELATED TO VoIP CALLS David Irwin and Jill Slay Abstract The Voice over Internet Protocol (VoIP) is designed for voice communications over IP networks. To use a VoIP service,

More information

A Network Simulation Experiment of WAN Based on OPNET

A Network Simulation Experiment of WAN Based on OPNET A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2

More information

A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack

A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack Abhishek Kumar Department of Computer Science and Engineering-Information Security NITK Surathkal-575025, India Dr. P. Santhi

More information

Social Media Mining. Data Mining Essentials

Social Media Mining. Data Mining Essentials Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Integration of GSM Module with PC Mother Board (GSM Trunking) WHITE/Technical PAPER. Author: Srinivasa Rao Bommana (srinivasrao.bommana@wipro.

Integration of GSM Module with PC Mother Board (GSM Trunking) WHITE/Technical PAPER. Author: Srinivasa Rao Bommana (srinivasrao.bommana@wipro. (GSM Trunking) WHITE/Technical PAPER Author: Srinivasa Rao Bommana (srinivasrao.bommana@wipro.com) Table of Contents 1. ABSTRACT... 3 2. INTRODUCTION... 3 3. PROPOSED SYSTEM... 4 4. SOLUTION DESCRIPTION...

More information

A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network

A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network A Method for Implementing, Simulating and Analyzing a Voice over Internet Protocol Network Bianca Enache Communication Department Politehnica University of Timisoara Timisoara, Romania enache.biancaemilia@gmail.com

More information

ETM System SIP Trunk Support Technical Discussion

ETM System SIP Trunk Support Technical Discussion ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with

More information

Improving Quality of Service

Improving Quality of Service Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic

More information

4 Internet QoS Management

4 Internet QoS Management 4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control

More information

TECHNICAL CHALLENGES OF VoIP BYPASS

TECHNICAL CHALLENGES OF VoIP BYPASS TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish

More information

Operation Manual Voice Overview (Voice Volume) Table of Contents

Operation Manual Voice Overview (Voice Volume) Table of Contents Operation Manual Voice Over (Voice Volume) Table of Contents Table of Contents Chapter 1 Voice Over... 1-1 1.1 Introduction to VoIP... 1-1 1.1.1 VoIP System... 1-1 1.1.2 Basic VoIP Call Flow... 1-2 1.1.3

More information

FPGA Implementation of Human Behavior Analysis Using Facial Image

FPGA Implementation of Human Behavior Analysis Using Facial Image RESEARCH ARTICLE OPEN ACCESS FPGA Implementation of Human Behavior Analysis Using Facial Image A.J Ezhil, K. Adalarasu Department of Electronics & Communication Engineering PSNA College of Engineering

More information

Integrate VoIP with your existing network

Integrate VoIP with your existing network Integrate VoIP with your existing network As organisations increasingly recognise and require the benefits voice over Internet Protocol (VoIP) offers, they stop asking "Why?" and start asking "How?". A

More information

Contents. Specialty Answering Service. All rights reserved.

Contents. Specialty Answering Service. All rights reserved. Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from

More information

A Model-based Methodology for Developing Secure VoIP Systems

A Model-based Methodology for Developing Secure VoIP Systems A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN

More information

Quality of Service Testing in the VoIP Environment

Quality of Service Testing in the VoIP Environment Whitepaper Quality of Service Testing in the VoIP Environment Carrying voice traffic over the Internet rather than the traditional public telephone network has revolutionized communications. Initially,

More information

ACL Based Dynamic Network Reachability in Cross Domain

ACL Based Dynamic Network Reachability in Cross Domain South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer

More information

Encryption and Decryption for Secure Communication

Encryption and Decryption for Secure Communication Encryption and Decryption for Secure Communication Charu Rohilla Rahul Kumar Yadav Sugandha Singh Research Scholar, M.TECH CSE Dept. Asst. Prof. IT Dept. Asso. Prof. CSE Dept. PDMCE, B.Garh PDMCE, B.Garh

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched

More information

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier VoLTE 3GPP Roaming Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends VoLTE Roaming and ion Standard Technology In 3GPP Release 11, the VoLTE roaming and interconnection architecture

More information

Advantech WebAccess Device Driver Guide. BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide

Advantech WebAccess Device Driver Guide. BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide Version 5.0 rev 1 Advantech Corp., Ltd. Table of Contents BwSNMP Advantech WebAccess to SNMP Agent (Simple

More information

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc. Emerald Network Collector Version 4.0 Emerald Management Suite IEA Software, Inc. Table Of Contents Purpose... 3 Overview... 3 Modules... 3 Installation... 3 Configuration... 3 Filter Definitions... 4

More information

A secure face tracking system

A secure face tracking system International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking

More information

Implementing VoIP support in a VSAT network based on SoftSwitch integration

Implementing VoIP support in a VSAT network based on SoftSwitch integration Implementing VoIP support in a VSAT network based on SoftSwitch integration Abstract Satellite communications based on geo-synchronous satellites are characterized by a large delay, and high cost of resources.

More information

EE4607 Session Initiation Protocol

EE4607 Session Initiation Protocol EE4607 Session Initiation Protocol Michael Barry michael.barry@ul.ie william.kent@ul.ie Outline of Lecture IP Telephony the need for SIP Session Initiation Protocol Addressing SIP Methods/Responses Functional

More information

Security issues in Voice over IP: A Review

Security issues in Voice over IP: A Review www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu

More information

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11

More information

Cover. White Paper. (nchronos 4.1)

Cover. White Paper. (nchronos 4.1) Cover White Paper (nchronos 4.1) Copyright Copyright 2013 Colasoft LLC. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Basic principles of Voice over IP

Basic principles of Voice over IP Basic principles of Voice over IP Dr. Peter Počta {pocta@fel.uniza.sk} Department of Telecommunications and Multimedia Faculty of Electrical Engineering University of Žilina, Slovakia Outline VoIP Transmission

More information

SIP Trunking and Voice over IP

SIP Trunking and Voice over IP SIP Trunking and Voice over IP Agenda What is SIP Trunking? SIP Signaling How is Voice encoded and transported? What are the Voice over IP Impairments? How is Voice Quality measured? VoIP Technology Confidential

More information

Application Notes. Introduction. Sources of delay. Contents. Impact of Delay in Voice over IP Services VoIP Performance Management.

Application Notes. Introduction. Sources of delay. Contents. Impact of Delay in Voice over IP Services VoIP Performance Management. Application Notes Title Series Impact of Delay in Voice over IP Services VoIP Performance Management Date January 2006 Overview This application note describes the sources of delay in Voice over IP services,

More information

Kiwi SyslogGen. A Freeware Syslog message generator for Windows. by SolarWinds, Inc.

Kiwi SyslogGen. A Freeware Syslog message generator for Windows. by SolarWinds, Inc. Kiwi SyslogGen A Freeware Syslog message generator for Windows by SolarWinds, Inc. Kiwi SyslogGen is a free Windows Syslog message generator which sends Unix type Syslog messages to any PC or Unix Syslog

More information

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------ Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------

More information

Automated Load Testing for SIP Applications

Automated Load Testing for SIP Applications Automated Load Testing for SIP Applications Serge Kruppa Director of Engineering Astricon 2008, Glendale AZ About LiveVox Leading provider of hosted VoIP dialing solutions, with integrated ACD and IVR,

More information

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility) Internet, Part 2 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support 3) Mobility aspects (terminal vs. personal mobility) 4) Mobile IP Session Initiation Protocol (SIP) SIP is a protocol

More information

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test

More information

Overview of Voice Over Internet Protocol

Overview of Voice Over Internet Protocol Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of

More information

NTT DOCOMO Technical Journal. Shabette-Concier for Raku-Raku Smartphone Improvements to Voice Agent Service for Senior Users. 1.

NTT DOCOMO Technical Journal. Shabette-Concier for Raku-Raku Smartphone Improvements to Voice Agent Service for Senior Users. 1. Raku-Raku Smartphone Voice Agent UI Shabette-Concier for Raku-Raku Smartphone Improvements to Voice Agent Service for Senior Users We have created a new version of Shabette-Concier for Raku-Raku for the

More information

NQA Technology White Paper

NQA Technology White Paper NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics

More information

The Analysis and Simulation of VoIP

The Analysis and Simulation of VoIP ENSC 427 Communication Networks Spring 2013 Final Project The Analysis and Simulation of VoIP http://www.sfu.ca/~cjw11/427project.html Group #3 Demet Dilekci ddilekci@sfu.ca Conrad Wang cw11@sfu.ca Jiang

More information

Perceived Speech Quality Prediction for Voice over IP-based Networks

Perceived Speech Quality Prediction for Voice over IP-based Networks Perceived Speech Quality Prediction for Voice over IP-based Networks Lingfen Sun and Emmanuel C. Ifeachor Department of Communication and Electronic Engineering, University of Plymouth, Plymouth PL 8AA,

More information

Voice over IP. Presentation Outline. Objectives

Voice over IP. Presentation Outline. Objectives Voice over IP Professor Richard Harris Presentation Outline Brief overview of VoIP and applications Challenges of VoIP IP Support for Voice Protocols used for VoIP (current views) RTP RTCP RSVP H.323 Semester

More information

ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers.

ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers. ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers. API: An application programming interface (API) is a source

More information

EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL

EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL PREPARATIONS STUDYING SIP PROTOCOL The aim of this exercise is to study the basic aspects of the SIP protocol. Before executing the exercise you should

More information

An Arabic Text-To-Speech System Based on Artificial Neural Networks

An Arabic Text-To-Speech System Based on Artificial Neural Networks Journal of Computer Science 5 (3): 207-213, 2009 ISSN 1549-3636 2009 Science Publications An Arabic Text-To-Speech System Based on Artificial Neural Networks Ghadeer Al-Said and Moussa Abdallah Department

More information

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE Microsoft Office Communications Server 2007 & Coyote Point Equalizer DEPLOYMENT GUIDE Table of Contents Unified Communications Application Delivery...2 General Requirements...6 Equalizer Configuration...7

More information

Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data

Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data CMPE 59H Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data Term Project Report Fatma Güney, Kübra Kalkan 1/15/2013 Keywords: Non-linear

More information

Introduction to Packet Voice Technologies and VoIP

Introduction to Packet Voice Technologies and VoIP Introduction to Packet Voice Technologies and VoIP Cisco Networking Academy Program Halmstad University Olga Torstensson 035-167575 olga.torstensson@ide.hh.se IP Telephony 1 Traditional Telephony 2 Basic

More information

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

White paper. SIP An introduction

White paper. SIP An introduction White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary

More information

Voice over IP Probe! for Network Operators and! Internet Service Providers

Voice over IP Probe! for Network Operators and! Internet Service Providers Voice over IP Probe! for Network Operators and! Internet Service Providers Product Presentation September 2011 2011 ADVENAGE GmbH Agenda Voice over IP Probe Key Facts VoIP Probe in a Nutshell Use Cases

More information

Available from Deakin Research Online:

Available from Deakin Research Online: This is the authors final peered reviewed (post print) version of the item published as: Adibi,S 2014, A low overhead scaled equalized harmonic-based voice authentication system, Telematics and informatics,

More information

International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 8 August 2013

International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 8 August 2013 A Short-Term Traffic Prediction On A Distributed Network Using Multiple Regression Equation Ms.Sharmi.S 1 Research Scholar, MS University,Thirunelvelli Dr.M.Punithavalli Director, SREC,Coimbatore. Abstract:

More information

Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper

Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper > A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information

More information

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in

More information

Using Data Mining for Mobile Communication Clustering and Characterization

Using Data Mining for Mobile Communication Clustering and Characterization Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer

More information

FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router*

FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 399-407 UDK: 004.738.5.057.4 FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router* Marko Carević 1,a,

More information

Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop

Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill david.idol@unc.edu http://www.cs.unc.edu/~mxrider

More information