56 results on '"Telephone network"'
Search Results
2. Introduction
- Author
-
Iser, Bernd, editor, Minker, Wolfgang, editor, and Schmidt, Gerhard, editor
- Published
- 2008
- Full Text
- View/download PDF
3. Introduction
- Author
-
Park, Kun I.
- Published
- 2005
- Full Text
- View/download PDF
4. Motivation and Introduction
- Author
-
Möller, Sebastian
- Published
- 2005
- Full Text
- View/download PDF
5. Introduction to Telecommunication Systems
- Author
-
Chan, Wah Chun
- Published
- 2002
- Full Text
- View/download PDF
6. Telecommunications
- Author
-
Storm, David R. and Storm, David R.
- Published
- 2001
- Full Text
- View/download PDF
7. Automation and Computer Science
- Author
-
Hall, George M. and Hall, George M.
- Published
- 1997
- Full Text
- View/download PDF
8. Basic Intelligent Network Concepts
- Author
-
Ahamed, Syed V., Lawrence, Victor B., Ahamed, Syed V., and Lawrence, Victor B.
- Published
- 1997
- Full Text
- View/download PDF
9. Basic Communication Networks
- Author
-
Ahamed, Syed V., Lawrence, Victor B., Ahamed, Syed V., and Lawrence, Victor B.
- Published
- 1997
- Full Text
- View/download PDF
10. A
- Author
-
Fist, Stewart, Sharrock, S., editor, and Fist, Stewart
- Published
- 1996
- Full Text
- View/download PDF
11. C
- Author
-
Fist, Stewart, Sharrock, S., editor, and Fist, Stewart
- Published
- 1996
- Full Text
- View/download PDF
12. NOAA — An Expert System managing the Telephone Network
- Author
-
Goodman, R. M., Ambrose, B. E., Latin, H. W., Ulmer, C. T., Sethi, Adarshpal S., editor, Raynaud, Yves, editor, and Faure-Vincent, Fabienne, editor
- Published
- 1995
- Full Text
- View/download PDF
13. Digital Techniques in the Telephone Network
- Author
-
Keiser, Bernhard E., Strange, Eugene, Keiser, Bernhard E., and Strange, Eugene
- Published
- 1995
- Full Text
- View/download PDF
14. The Cost Structure of Personal Communications Services
- Author
-
Reed, David P., Gallager, Robert, editor, Holtzman, Jack M., editor, and Goodman, David J., editor
- Published
- 1994
- Full Text
- View/download PDF
15. Communications Services
- Author
-
Alber, Antone F. and Alber, Antone F.
- Published
- 1993
- Full Text
- View/download PDF
16. Integrated Service Digital Network (ISDN)
- Author
-
Slana, Matthew F., Lucky, R. W., editor, and McDonald, John C., editor
- Published
- 1990
- Full Text
- View/download PDF
17. telephone network
- Author
-
Weik, Martin H. and Weik, Martin H.
- Published
- 2001
- Full Text
- View/download PDF
18. Digital Transmission Over the Telephone Network
- Author
-
Smith, David R. and Smith, David R.
- Published
- 1985
- Full Text
- View/download PDF
19. Quality Control and Telematics
- Author
-
Valdiguie, P. M., Corberand, J. X., Fernet, P., Kerkhof, P. L. M., editor, and van Dieijen-Visser, M. P., editor
- Published
- 1988
- Full Text
- View/download PDF
20. Development and evaluation of online text-independent speaker verification system for remote person authentication
- Author
-
Chakrabarty, Debmalya, Prasanna, S. R. Mahadeva, and Das, Rohan Kumar
- Published
- 2013
- Full Text
- View/download PDF
21. Applied Queueing Systems
- Author
-
László Szeidl, Miklós Telek, and László Lakatos
- Subjects
Service (business) ,Queueing theory ,Telephone network ,Computer science ,business.industry ,Bandwidth (computing) ,Layered queueing network ,G-network ,Markov model ,business ,Bulk queue ,Computer network - Abstract
Traditional telephone networks were designed to implement a single type of communication service, i.e., the telephone service. Today’s telecommunication networks implement a wide range of communication services. In this section we introduce Markov models of communication services that compete for the bandwidth of a finite-capacity communication link.
- Published
- 2012
- Full Text
- View/download PDF
22. Polyhedral Approaches to the Design of Survivable Networks
- Author
-
Martine Labbé and Bernard Fortz
- Subjects
Network planning and design ,Telephone network ,Computer science ,Bounded function ,Path (graph theory) ,Survivability ,Combinatorial optimization ,Limit (mathematics) ,Topology ,Branch and cut - Abstract
Long-term planning of backbone telephone networks has been an important area of application of combinatorial optimization over the last few years. In this chapter, we review polyhedral results for models related to these problems. In particular, we study classical survivability requirements in terms of k-connectivity of the network, then we extend the survivability model to include the notion of bounded rings that limit the length of the rerouting path in case of link failure.
- Published
- 2008
- Full Text
- View/download PDF
23. Simulation of Computer Networks
- Author
-
Teerawat Issariyakul and Ekram Hossain
- Subjects
Telephone network ,business.industry ,Computer science ,Process (engineering) ,Asynchronous Transfer Mode ,Wireless ,The Internet ,Convergence (relationship) ,Broadcasting ,Telecommunications ,business ,Telecommunications network - Abstract
People communicate. One way or another, they exchange some information among themselves all the times. In the past several decades, many electronic technologies have been invented to aid this process of exchanging information in an efficient and creative way. Among these are the creation of fixed telephone networks, the broadcasting of television and radio, the advent of computers, the rise of the Internet, and the emergence of wireless sensation. Originally, these technologies existed and operated independently, serving their very own purposes. Not until recently that these technological wonders have started to converge, and it is a well-known fact that a computer communication network is a result of this convergence.
- Published
- 2008
- Full Text
- View/download PDF
24. Connecting Mobile Workstations to the Internet Over a Digital Cellular Telephone Network
- Author
-
Timo O. Alanko, Kimmo Raatikainen, and Markku Kojo
- Subjects
Telephone network ,business.product_category ,business.industry ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,Public land mobile network ,Dynamic circuit network ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Cellular network ,Internet access ,Telephony ,Mobile telephony ,business ,Computer network ,Mobile radio telephone - Abstract
Modern portable computers and wireless connections over a cellular telephone network have created a new platform for distributed information processing. We present a communication architecture framework which makes it possible to exploit the existing TCP/IP communication architecture but which also takes into account the specific features of wireless links. Our communication architecture is based on the principle of indirect interaction. The mediating interceptor, Mobile-Connection Host, is the bridge between the worlds of wireless and wireline communication. The interceptor also provides enhanced functionality that improves fault-tolerance and performance for applications aware of mobility. Prototypes of the architecture are implemented both for the Unix (Linux) and for the Windows (3.11) platform.
- Published
- 2007
- Full Text
- View/download PDF
25. The design of forward looking cost models for local exchange telecommunications networks
- Author
-
William W. Sharkey
- Subjects
Telephone network ,Network element ,Telecommunications control software ,Universal service ,Business ,Cluster analysis ,Spanning Tree Protocol ,Serving area interface ,Telecommunications network ,Industrial engineering ,Industrial organization - Abstract
In the last few years great strides have been made in the development of algorithms that design telephone networks. As computational capabilities improve it is possible to produce better results, both from an engineering and an economic standpoint. This paper considers the design issues that cost model developers have addressed successfully. Many of these issues are illustrated by a detailed description of a model developed by FCC staff, known as the Hybrid Cost Proxy Model (HCPM). HCPM is capable of utilizing very precise customer location data. From these data, the model uses clustering algorithms to identify serving areas that satisfy appropriate engineering constraints. Within each serving area, the model uses a modified minimum-cost spanning tree algorithm to connect actual customer locations to a serving area interface. The same tree algorithm connects each interface point to a switch. Within each path, the model performs intensive integer searches to find the cost minimizing, yet engineering-feasible, choice of technology and electronics for that path. The result is a-low cost, feasible network plan that gives an appropriate estimate of the forward looking cost of providing wireline telephone service to a particular area. This estimate should prove particularly useful in the ongoing debate about the size and make-up of the Universal Service Fund, and for other regulatory purposes such as the pricing of interconnection and unbundled network elements.
- Published
- 2007
- Full Text
- View/download PDF
26. Security in Globally Distributed Industrial Information Systems
- Author
-
Teemupekka Virtanen, Petri Saloma, and Ronja Addams-Moring
- Subjects
Telephone network ,Network security ,business.industry ,Computer science ,Multitier architecture ,Computer security ,computer.software_genre ,Security policy ,Distributed System Security Architecture ,Information system ,The Internet ,Information flow (information theory) ,business ,computer - Abstract
Today’s industrial market is global. Manufacturing and measuring products are geographically distributed all over the world. Furthermore, the products are sophisticated and include know-how, often in the form of software. Thus the manufacturer is often the only party that can provide the maintenance services. In this paper, we focus on single intelligent and resource limited devices, which need to be remotely monitored or controlled. With the global Internet, satellite and telephone networks the access itself becomes possible. However, security is a challenge, because the remote devices’ limited resources are pitted against threats from the Internet. We discuss the assets of and threats against a globally distributed industrial information system. To protect the assets, three possible security architectures, Centralized connections, Layered architecture and Integration of centralized and layered architecture, are proposed. Of these three, the integrated architecture meets best the requirements of a globally distributed industrial information system.
- Published
- 2004
- Full Text
- View/download PDF
27. Providing Voice Privacy over Public Switched Telephone Networks
- Author
-
Mohamed Sharif and Duminda Wijesekera
- Subjects
Telephone network ,business.industry ,Computer science ,Class 4 telephone switch ,Telephone line ,law.invention ,Public land mobile network ,law ,Class 5 telephone switch ,Telephone exchange ,Telephony ,Telecommunications ,business ,Mobile radio telephone - Abstract
The public telephone network has been evolving from manually switched wires carrying analog encoded voice of the I9th century to an automatically switched grid of copper-wired, fiber optical and radio linked portions carrying digitally encoded voice and other data. Simultaneously, as our security consciousness increases, so does our desire to keep our conversations private. Applied to the traffic traversing the globe on the public telephone network, privacy requires that our telephone companies provide us with a service whereby unintended third parties are unable to access other’s information. However, existing public telephone network infrastructures do not provide such a service. This paper proposes a security architecture that provides end-to-end voice privacy and authentication services within the boundaries of the existing public telephone network infrastructures. Proposed architecture uses public key cryptography for authentication and key distribution, and symmetric key cryptography for voice privacy. This work is a part of an on going project on securing telecommunication system architectures and protocols.
- Published
- 2003
- Full Text
- View/download PDF
28. Public Telephone Network Vulnerabilities
- Author
-
G. Lorenz, Sujeet Shenoi, J. Keller, John Hale, and Gavin W. Manes
- Subjects
Telephone network ,Wireless network ,business.industry ,Data_MISCELLANEOUS ,Communications system ,Computer security ,computer.software_genre ,Automation ,Deregulation ,Wireless ,The Internet ,Business ,computer ,Computer network - Abstract
The convergence of public telephone networks (PTNs), wireless networks and the Internet makes it possible to disrupt vital information and communications systems from afar with software. PTN vulnerabilities are also growing due to system complexity, deregulation, increasing numbers of highly-skilled attackers, and the automation of attacks. This paper analyzes PTNs vulnerabilities, and presents an attack taxonomy. The taxonomy considers security threats posed by in-band attacks, out-of-band attacks, wireless attacks and Internet attacks.
- Published
- 2002
- Full Text
- View/download PDF
29. Universal Service Obligation
- Author
-
Menahem Spiegel
- Subjects
Telephone network ,Universal service ,Network service ,Telecommunications service ,Meaning (existential) ,Obligation ,Business ,Marketing ,Telecommunications network ,Profit (economics) - Abstract
The Universal Service Obligation (USO) is a regulation often imposed on the providers of network services. In the case of the telephone network, the Universal Service Obligation regulation can be traced back to the Communication Act of 1934. Where this act charged the FCC to provide all people of the United State a rapid and efficient telecommunication network facility. As stated, the main principle of this regulation is the requirement that the provider of the network services will make available the basic telecommunication services to all the customers residing within its exclusive territory. The practical meaning (profit wise) of this policy is that the provider of network services is not allowed to select his customers just according to their contribution to his profits but must serve all customers even if some of them are generating negative profits. That is, some customers must be served at a price “bellow” cost.1
- Published
- 2000
- Full Text
- View/download PDF
30. The Common Structure of Packet - and Circuit-Switched Network Synthesis
- Author
-
André Girard
- Subjects
Link state packet ,Circuit switching ,Telephone network ,Transmission delay ,Burst switching ,Network packet ,business.industry ,Computer science ,Packet segmentation ,business ,Erlang (unit) ,Computer network - Abstract
The synthesis of switched telecommunication networks is the problem of finding the optimal transmission capacity on the links between switches and the optimal routing of communications on these links. For circuit-switched telephone networks, the first methods can be traced back almost 80 years ago in the pioneering work of Erlang. For data networks, the first analysis and synthesis techniques go back to the 1960’s with the work of Kleinrock (1964), Fratta, Gerla and Kleinrock (1973). For historical reasons, telephone and data networks methods were developed in isolation from each other.
- Published
- 1999
- Full Text
- View/download PDF
31. Automation and Computer Science
- Author
-
George M. Hall
- Subjects
Subcategory ,Telephone network ,Assembly language ,business.industry ,Computer science ,ComputingMilieux_PERSONALCOMPUTING ,Physical system ,Robotics ,Process automation system ,Automation ,ISA100.11a ,Human–computer interaction ,Artificial intelligence ,business ,Software engineering ,computer ,computer.programming_language - Abstract
The purpose of this chapter, like the previous chapter and all subsequent chapters, is to apply the thesis of the book to a subcategory of applications, in this case automation. Computers and robotics subtended by automation are obvious physical systems, but the principles and rules by which they operate are abstract. More importantly, these principles underwrite evolution and genetics, as well as man-made machines.
- Published
- 1997
- Full Text
- View/download PDF
32. Basic Intelligent Network Concepts
- Author
-
Syed V. Ahamed and Victor B. Lawrence
- Subjects
Channel capacity ,Operator (computer programming) ,Telephone network ,Intelligent Network ,Dynamic network analysis ,business.industry ,Computer science ,Asynchronous Transfer Mode ,Central processing unit ,business ,Direct memory access ,Computer network - Abstract
The capacity to adapt to the extensive and dynamic network conditions is a requirement of intelligent networks (INs). The network environment may change due to a large number of internal and/or external conditions. The network may become overloaded or faulty; it may experience switching delays or inadequate standby channel capacity or any other network condition. Further, the user or the source and the destination of the information may lead to an extraneous search before the right information is conveyed to the customer. In an overall sense, the network monitors its own performance without user, operator, or any other human intervention. In essence, the network adaptation responds to the environment in controlling and executing an entire range of communication functions.
- Published
- 1997
- Full Text
- View/download PDF
33. Data at Prisdn Rate
- Author
-
Syed V. Ahamed and Victor B. Lawrence
- Subjects
High rate ,Telephone network ,business.industry ,Computer science ,Integrated Services Digital Network ,Ranging ,Code rate ,TOPS ,business ,Desk ,Coding (social sciences) ,Computer network - Abstract
Various coding techniques are being considered for higher rates ranging from DS-1 over the existing twisted wire-pairs spanning the ISDN Central Offices to the Subscriber, and up to 155 Mbps from data distribution centers to desk tops. Rates higher than the basic information rate at 144 kbps, i.e., the H0 (384 kbps), 768 kbps, are discussed in Chapter 11. Most telephone networks have at least one metallic connection to the customers from the Central Office or a remote distribution facility. Enhanced use of this existing copper facility to transmit high-speed data appears to be a viable choice towards the ISDN video and imaging services. Simulation results for increased rate with ideal equalizers are presented in this Chapter. The use of fiber in the distribution plant facilitates the availability of very high rate data ranging from 51.64 Mbps (or the standard OC-1 rate) through 2.4 Gbps (OC-48 rate) at the network distribution centers. More recently, the OC-3 rate is gaining most popularity for the fiber coaxial ATM systems. However, the use of fiber to every home is not economical at this stage, because of the existing copper wire-pairs to customer residences and almost all businesses. There is also a lack of justification for such high rates (even the OC-1 rate) to every customer.
- Published
- 1997
- Full Text
- View/download PDF
34. Integrated Services Digital Network (ISDN)
- Author
-
William J Buchanan
- Subjects
Telephone network ,Computer science ,business.industry ,Frame Relay ,Primary Rate Interface ,Broadband Integrated Services Digital Network ,Integrated Services Digital Network ,ISDN digital subscriber line ,Network termination ,business ,Link Access Procedures, D channel ,Computer network - Abstract
Chapter 10 shows that to encode speech digitally requires a bit-rate of 64 kbps. Most public telephone networks have now changed from analogue transmission to digital exchanges using PCM switching and transmission. The interface to many telephones is still analogue, as shown in Figure 11.1(a). Over the coming years this will change so that the speech is converted to digital data within the consumer’s equipment, as illustrated in Figure 11.1(b). The consumer’s equipment will also provide signalling information.
- Published
- 1996
- Full Text
- View/download PDF
35. Acoustic Echo Cancellation Using Subband Adaptive Filtering
- Author
-
D.M. Etter and Phillip L. De Leon
- Subjects
Adaptive filter ,Least mean squares filter ,Telephone network ,Transmission (telecommunications) ,Computer science ,Adaptive system ,Echo (computing) ,Convergence (routing) ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,Algorithm ,Impulse response - Abstract
Adaptive filtering has been successfully used in canceling line echos in the telephone network since the 1960’s [179, 443, 387]. In these cases, the adaptive filter is used to model the unknown echo path in a communications channel and then cancel the echo signals from the conversation. An adaptive filter is required because the echo path is not only unknown, but also because it is different for each network path. However, the acoustic echo cancellation problem is not as easily solved with conventional adaptive filtering systems due to the requirements for a much longer adaptive impulse response and for faster convergence since the acoustic echo path is time-varying during the communication transmission. In this chapter, we summarize key results from adaptive filter theory, and discuss the least mean square (LMS) and normalized least mean square (NLMS) algorithms used to adjust an adaptive filter. We then examine adaptive filtering in subbands as one method for acoustic echo cancellation. Simulations (using a measured room response with speech signals) demonstrate that the oversampled subband adaptive system provides improved performance for acoustic echo cancellation applications.
- Published
- 1996
- Full Text
- View/download PDF
36. Graph-Theoretical Optimization Methods
- Author
-
E. A. Medova
- Subjects
Telephone network ,Computer science ,business.industry ,Broadband networks ,Node (networking) ,Local area network ,Steiner tree problem ,Telecommunications network ,symbols.namesake ,Reachability ,symbols ,Graph (abstract data type) ,business ,Computer network - Abstract
Communications networks of any kind — from early telegraph and circuit-switched telephone networks to future integrated broadband networks — are represented most naturally by a graph G(V,E), where vertices, or nodes, of V are essentially switches (telephones or computer terminals) and the edges or arcs of E are the transmission links. Classification of networks, for example into local area networks (LANs), metropolitan area networks (MANs) or wide area networks (WANs), will result in a change of the technical definitions of network nodes and their geographical coverage, but the graph representation preserves the concepts of ‘interconnectivity’ and ‘reachability’ in terms of existing paths leading from any one node to any other node. This is the precise reason why graph-theoretical methods are of great importance for design and routeing in telecommunications networks.
- Published
- 1996
- Full Text
- View/download PDF
37. The First Telephone Engineers
- Author
-
John Bray
- Subjects
Telephone network ,History ,business.industry ,Watson ,Dual-tone multi-frequency signaling ,Telephone line ,law.invention ,Rotary dial ,law ,Telephone exchange ,Telecommunications ,business ,Telephone switchboard ,Mobile radio telephone - Abstract
It may well have been Alexander Graham Bell’s successful demonstration on March 10, 1876, of what was later claimed to be the world’s first demonstration of the electronic transmission of intelligible speech—enshrined in Bell’s historic call to his assistant: “Mr. Watson, come here, I want to see you”—that set in motion what eventually became a major step forward in communication at distance. However, the history of the invention of the telephone is complex and Bell’s was by no means the only contribution.
- Published
- 1995
- Full Text
- View/download PDF
38. Single-Sideband Modulation and Frequency Translation
- Author
-
Steven A. Tretter
- Subjects
Pilot signal ,Physics ,Telephone network ,Optics ,Sideband ,business.industry ,Carrier frequency offset ,Bandwidth (signal processing) ,Baseband ,High-pass filter ,business ,Single-sideband modulation - Abstract
AM and DSBSC-AM modulation do not use the frequency spectrum efficiently. Their spectral components equal distances above and below the carrier frequency contain identical information because they are complex conjugates of each other. The portion above the carrier frequency is called the upper sideband and the portion below the lower sideband. In this experiment you will see how a baseband message can be transmitted by using only one of the sidebands and, consequently, half the bandwidth of AM or DSBSC-AM. This type of modulation is called single-sideband (SSB) modulation. It has been extensively used in many radio transmission systems and in the telephone network.
- Published
- 1995
- Full Text
- View/download PDF
39. A Network in Transition
- Author
-
Bernhard E. Keiser and Eugene Strange
- Subjects
Telephone network ,State (polity) ,business.industry ,media_common.quotation_subject ,Transition (fiction) ,Asynchronous Transfer Mode ,Control (management) ,Telephony ,Mobile telephony ,business ,Common carrier ,Telecommunications ,media_common - Abstract
To say that telephony is in a state of transition is to describe the history of telephony. It always has been in a state of transition and will continue so for the foreseeable future. As the world has been increasingly compressed in size through television and telecommunications, the trend of telephony standards has been toward enabling worldwide application rather than having each national network go its own way. While national networks still are interconnected through gateways, primarily for billing control, international signaling systems are becoming standardized with only minor national differences.
- Published
- 1995
- Full Text
- View/download PDF
40. NOAA — An Expert System managing the Telephone Network
- Author
-
Rodney M. Goodman, B. E. Ambrose, C. T. Ulmer, and Hayes Latin
- Subjects
Telephone network ,Artificial neural network ,business.industry ,Computer science ,computer.software_genre ,Network operations center ,Expert system ,Network management ,Data mining ,Time series ,business ,Expansive ,computer ,Computer network - Abstract
A report is given on an expert system called NOAA, Network Operations Analyzer and Assistant, that manages the Pacific Bell Californian telephone network. Progress towards automatic implementation of expansive controls is complete. Progress towards restrictive controls is partially complete. Comments are made on current research including the use of neural networks for Time Series Prediction.
- Published
- 1995
- Full Text
- View/download PDF
41. Text-Independent Talker Verification Using Cohort Normalized Scores
- Author
-
David J. Burr
- Subjects
Identification (information) ,Variation (linguistics) ,Telephone network ,Microphone ,Computer science ,Speech recognition ,Cohort ,Vector quantization ,TIMIT ,Speaker recognition - Abstract
It is difficult to implement talker recognition on the telephone network because of normal variation in the channel characteristics. The primary component of variation is due to the different telephone handsets or microphone frequency characteristics (Rosenberg and Soong, 1992). Lack of availability of telephone speech databases has also contributed to slow progress in the solution of these problems, though clean speech databases such as TIMIT (Garofolo et al., 1988) have been available. A telephone speech database suitable for talker identification research (Godfrey, 1992) was not generally available at the time of this research.
- Published
- 1994
- Full Text
- View/download PDF
42. The Challenges for analog circuit design in Mobile radio VLSI chips
- Author
-
D. Rabaey and J. Sevenhans
- Subjects
Mobile radio ,Telephone network ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Electrical engineering ,Digital Enhanced Cordless Telecommunications ,Mixed-signal integrated circuit ,Hardware_PERFORMANCEANDRELIABILITY ,GSM ,Embedded system ,Hardware_INTEGRATEDCIRCUITS ,Wireless ,Car phone ,Telephony ,business - Abstract
Mobile radio telephony is becoming a driving application for analog circuit design and silicon CMOS and RF bipolar technology. New telecom systems like GSM, PCN, DECT, Wireless in the loop ... are all developing very rapidly and will enable us very soon to organise a complete telephone network with full coverage for your mobile car phone, as well as in your kitchen and on your office desk. In Europe the major telecom companies have worked together to establish one common standard for cellular mobile radio communications at 900MHz. Similar things are happening for other wireless personal communication systems. Basically the cellular radio telephone, the wireless PABX and the wireless SLIC are bringing the same challenges to analog circuit design: maximum integration of the basic radio functions into 1 or 2 silicon chips, CMOS, Bipolar or BICMOS or GaAs.
- Published
- 1994
- Full Text
- View/download PDF
43. Assignable Grade of Service using Time Dependent Priorities — N Classes
- Author
-
Mark Perry, Arne A. Nilsson, and Chandramouli Sargor
- Subjects
Waiting time ,Access network ,Telephone network ,Grade of service ,Computer science ,business.industry ,Carry (arithmetic) ,Real-time computing ,Bandwidth (computing) ,business ,Computer network - Abstract
A new generation of High Speed Switching equipment that can handle multiple types of information — such as voice, video and data is being developed. Because voice services dominate current telephone network applications, bandwidth for network access is based on Grade-of-Service (GOS) requirements for it. This paper provides a method for allocating access capacity for High Speed networks that carry multiple types of information with different GOS requirements. The GOS is assumed to be given in terms of mean waiting time until access to the network is provided. We will develop an algorithm that calculates priority factors which will meet given Grade-of-Service requirements for different types of information.
- Published
- 1993
- Full Text
- View/download PDF
44. High Quality Low-Delay Speech Coding at 12 kb/s
- Author
-
Peter Kabal, Paul Mermelstein, Majid Foodeei, and John Grass
- Subjects
Wireless telephony ,Mobile radio ,Telephone network ,Computer science ,Speech quality ,media_common.quotation_subject ,Speech recognition ,Speech coding ,Low delay ,Quality (business) ,Data_CODINGANDINFORMATIONTHEORY ,Male speaker ,media_common - Abstract
For low-delay speech coders, the research challenge is to obtain higher compression rates while maintaining very high speech quality and meeting stringent low delay requirements. Such coders have applications in telephone networks, mobile radio, and increasingly for in-building wireless telephony.
- Published
- 1993
- Full Text
- View/download PDF
45. QoS Enhancements and the New Transport Services
- Author
-
Luc Léonard, André Danthine, Yves Baguette, Guy Leduc, and Olivier Bonaventure
- Subjects
Network congestion ,Packet switching ,Telephone network ,Computer science ,business.industry ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Service user ,Mobile QoS ,Service provider ,business ,Computer network - Abstract
The transport protocols TCP and TP4 have been designed in the late seventies at a time when the network environment was essentially based on the switched telephone network and on leased-lines and when the packet switching was an emerging concept.
- Published
- 1993
- Full Text
- View/download PDF
46. Subjective Assessment Methods for the Measurement of Digital Speech Coder Quality
- Author
-
Spiros Dimolitsas
- Subjects
Telephone network ,Standardization ,Computer science ,Human–computer interaction ,Speech recognition ,media_common.quotation_subject ,Mean opinion score ,Speech coding ,Selection (linguistics) ,Quality (business) ,Transmission system ,Articulation (phonetics) ,media_common - Abstract
Standardization activities in digital speech coding over the past few years have resulted in an increasing need to develop and understand the methodologies used to subjectively assess new voice transmission systems before they are introduced into a telephone network. In this chapter a review of subjective methodologies for the assessment of telephone or good communications quality digital speech coding systems is provided. Technical aspects concerning the network applications and other characteristics relevant to the type of system under evaluation are briefly considered first, since these factors influence the selection of a suitable assessment methodology. Next, listener opinion tests are described. Finally, articulation and diagnostic tests as well as conversational opinion and field tests are briefly addressed.
- Published
- 1993
- Full Text
- View/download PDF
47. The Quality of Regulation in Regulating Quality
- Author
-
Eli M. Noam
- Subjects
Flexibility (engineering) ,Inflation ,Service quality ,Telephone network ,Price equation ,Incentive ,media_common.quotation_subject ,Quality (business) ,Business ,Productivity ,Industrial organization ,media_common - Abstract
This article surveys the post-divestiture trend of service quality in the public telephone network and proposes an incentive system for assuring such service quality, while providing greater flexibility to telephone companies in reaching high quality standards. The approach could be part of a price formula involving inflation and productivity; it could also be applied under different regulatory arrangements.
- Published
- 1991
- Full Text
- View/download PDF
48. Transmitting Digital Speech in a Portable Radio Environment
- Author
-
David W. Lin and Vijay K. Varma
- Subjects
Mobile radio ,Cordless ,Telephone network ,Computer science ,business.industry ,Wireline ,Time division multiple access ,Paging ,Forward error correction ,Digital radio ,Telecommunications ,business ,GeneralLiterature_REFERENCE(e.g.,dictionaries,encyclopedias,glossaries) - Abstract
There is an increasing demand for providing voice communications to a person away from his/her wireline telephone. The popularity of cordless telephones, mobile radio telephones, radio paging, and other emerging portable communications technologies clearly demonstrates this demand. By extending the capabilities of the existing telephone network, portable communications can be provided to roving users.
- Published
- 1991
- Full Text
- View/download PDF
49. Integrated Service Digital Network (ISDN)
- Author
-
Matthew F. Slana
- Subjects
X.25 ,Digital subscriber line ,Telephone network ,Computer science ,business.industry ,Frame Relay ,Integrated Services Digital Network ,ISDN digital subscriber line ,Bearer-Independent Call Control ,business ,Link Access Procedures, D channel ,Computer network - Abstract
While the telephone network has progressed in the process of transmitting and switching information based on the digitization of voice, leading to the integrated digital network (IDN), the rapid advances in computer and data communication technologies have evolved and have generated their own need for network capability to meet data needs. This has led to the realization that the same digital techniques can be used for data or voice transmission and switching. With ever-increasing demand for efficient interconnection of voice and data customers, the differences between voice and data switching and transmission have led to the study and development of integrated systems to transmit, switch, and process all types of digital signals. The final evolution of these systems is the integrated service digital network (ISDN). With the IDN having the inherent capability of handling both voice and data in digital form, the ISDN provides end-to-end digital connectivity, supporting a full range of services by means of standardized local access arrangements to a “transparent” transport medium.
- Published
- 1990
- Full Text
- View/download PDF
50. Genesis, A Real-Time Expert System for Network Control
- Author
-
Victor Mathis, Delano C. Stevens, Perry M. Kosieniak, and Michael G. St. Jacques
- Subjects
Telephone network ,business.industry ,Computer science ,Interface (computing) ,Distributed computing ,Network monitoring ,Blackboard (design pattern) ,computer.software_genre ,Expert system ,Network management ,Systems design ,business ,computer ,Heterogeneous network - Abstract
A high level system design for GENESIS, a GEneric Network Expert System with Intelligent Simulation, is presented. GENESIS is a real-time expert system which will monitor and control the public voice telephone network. The design includes a human interface for display and user input, a realistic simulation of the network with expert heuristics to drive and test the expert system in real-time, an interface to required data bases and a blackboard for intermodule communications and control. The system is generic in that it was designed to reside above any network monitoring or data-collection system and to handle heterogeneous networks consisting of switching equipment from different manufacturers and a mix of product release levels. Key features of the design are flexibility and expandability to handle a growing network and changing needs.
- Published
- 1990
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.