Вы находитесь на странице: 1из 47

NETWORKS

I-Gate 4000 Block Diagram & Technologies

VERAZ TEAM
Confidential

I-Gate 4000 VoIP - Block Diagram

NETWORKS

PCM Matrix

Voice

Packet Assembly

VAD CNG

Compression CODECS

Interface

Echo Signal Canceller Analyzer

Fax Frame Relay Demod / Remod

(SWITCH)

T.38

Physical Layer

-----

PSTN

VBD Bypass mode over RTP G.711, 20 msec

IP Network

TDM
ISDN Sig

Signaling Transformation

CPU
IUA
ISDN User Adaptation Layer

I-Gate 4000 IP over TDM - Block Diagram

NETWORKS

PCM Matrix

Voice

PSTN

Interface

Echo Signal Canceller Analyzer

-----

Demod / Remod

VBD Bypass mode over RTP G.711, 20 msec

Interface

Fax Frame Relay

T.38

Packet Assembly

VAD CNG

Compression CODECS

TDM Bearer

TDM Trunks

Signaling Compression

CPU

The Interface stage

NETWORKS

The Interface stage provides interfacing between standard 1.544 Mbps or 2.048 Mbps external trunks and the IGate-4000 terminal internal signals

The PCM matrix

NETWORKS

The PCM matrix create an internal numeration for the incoming time-slots.

The Signal Analyzer

NETWORKS

Differentiation of Voice, Data and Fax calls, by recognition of special tones and patterns, enabling activation of the appropriate processing mechanism.

The Signal Analyzer

NETWORKS

The Echo Canceller

NETWORKS

The I-Gate 4000 is equipped with an internal echo canceller. Echo Cancellation is enabled for voice and disabled for FAX/VBD. Echo canceller complies with ITU-T G.168 Recommendation and supports Tail Length of up to 128 ms

Echo - Hybrid Transformer


Impedance mismatch at the hybrid transformer is the most common reason for echo

NETWORKS

Two wire section

Four wire section

Voice handling

NETWORKS

Voice Activity Detection and Voice compression are implemented in order to save bandwidth.

VAD and Silence Suppression

NETWORKS

During a voice call, active signals are present only 40% of the time. Voice Activity Detection and silence suppression can save 50 to 60% of the voice bandwidth and, reduction of router CPU utilization in the network (reduced number of packets).

VAD - Voice Activity Detector (Silence suppression mechanism)


Energy

NETWORKS

START OF SPEECH BURST

HELLO
Minimum level of Energy NOISE THRESHOLD

END OF SPEECH BURST

Time

AVERAGE SPEECH BURST = 1.3 SECONDS

Comfort Noise Generation


NETWORKS

Complete silence" is uncomfortable for both parties.

Injection of appropriate background noise at the receiveend, enhances call quality.

Voice Compression

NETWORKS

The voice signal can be compressed using compression Speech Codecs.

Common Codecs include G.711, G.729A, G.729B

Speech Quality Mean Opinion Score

NETWORKS

Evaluation of the audio quality follows the P.800 ITU-T recommendation and uses a Mean Opinion Score (MOS) as the criteria Human judges are subjected to hearing clips of human voice under controlled conditions and are asked to rate the quality of the audio MOS range - Score from one (1) to five (5)
Five (5) being the highest (best) quality

MOS - Mean Opinion Score

NETWORKS

Good morning my friends

Source

Rating Speech Quality Level of Distortion


5 4 3 2 1 Excellent Good Fair Poor Unsatisfactory Imperceptible Just perceptible, not annoying Perceptible, slightly annoying Annoying but not objectionable Very annoying, objectionable
1 2 3 4 5

MOS - Mean Opinion Score

NETWORKS

Toll Quality CODECs


Best Quality / MOS results Lab and Field Tests

MOS Toll Quality Values


NETWORKS

Codec
G.711 G.711 G.729 G.729
G.729A (64 kbps) (64 kbps) (8 kbps) (8 kbps) (8 kbps) (8 kbps)

Framing Time 10 msec 20 msec 10 msec 20 msec 10 msec 20 msec 30 msec 30 msec

MOS 4.1 4.1 3.9 3.9 3.85 3.85 3.8 3.75 Near TollQuality Codecs Toll Quality Codecs

G.729A

G.723.1 (6.3 kbps) G.723.1 (5.3 kbps)

FAX handling

NETWORKS

Fax transmission is supported for ITU-T Group 3 Fax machines. (up to 14.4 k)

Fax - ITU Transmission Protocols

NETWORKS

ITU T.4

--- Techniques for scanning, coding, modulation and transmission.

ITU T.30 ITU T.38

-- Control protocol for handshaking. -- FAX over IP

The DSP in the gateway nearest the sending fax machine emulates a receiving fax machine and terminate the fax message into a digital format. The gateway then packetizes the digitized fax message and sends it to the gateway nearest the receiving fax machine. The receiving gateway then emulates a sending fax machine and sends the fax data to the receiving fax machine I-Gate 4000 uses a redundancy function for protection against packet-losses.

Fax over IP Handling


T.4, T.30 (Fax proc., Fax Hdk))

NETWORKS

T.4, T.30 (Fax proc., Fax Hdk)) T.38 (Fax over IP) T.38 (Fax over IP) MOD

Tx FAX
PCM
MODULATOR

Rx FAX
PCM
DEMODULATOR

DEM

D A

4.8 7.2 9.6 KBPS 12.8 14.4

SCANNER

PRINTER

I IP P NW NW
VBD

A
VBD DIGITAL EXCHANGE

DIGITAL EXCHANGE

MG

IP LINK

MG

64 KBPS INPUT BIT RATE OUTPUT BIT RATE

64 KBPS 64,000 9600 6

4.8 7.2 9.6 KBPS 12.8 14.4

FAX COMPRESSION RATIO (expl.) =

~ ~ 1

VBD handling

NETWORKS

A modem is detected by the Signal Analyzing layer and is transferred in transparent mode. (G.711, Packetization Period: 20 msec)

VBD Handling

NETWORKS

I-Gate 4000 can support all types of VBD VBD calls arrive as 64 kbps calls

Similarly to fax, VBD starts as Voice VBD is transferred in Bypass mode VBD is transmitted over RTP Echo cancellation is disabled automatically

DTMF Signals Handling over IP

NETWORKS

Detection and classification of any DTMF signals.

In-band transmission using RTP packets according to RFC2833 Out-of-band transmission via MGC, in switching mode only
MGC

Out-of-band DTMF

IP network TDM Switch I-Gate 4000 In-band DTMF (RFC-2833) I-Gate 4000 TDM Switch

The Packet Assembly stage

NETWORKS

This stage executes the packetization of the compressed traffic and its mapping to the IP layer.

I-Gate 4000 Packet Structure

Typical VoIP Packet


NETWORKS

VoIP Packet Structure


m in im a l G A P PA

NETWORKS

DA

SA

Type

CRC

S o u rc e P o rt L e n g th

D e s tin a tio n P o r t C hecksum

(12 )

(8)

(12)

(2)

(4)

Ethernet (38)

IP (20)

UDP RTP (8) (12)

Payload (10..320)

V e r s io n

IH L

T y p e o f S e r v ic e F la g s

T o ta l L e n g th F ra g m e n t O ffs e t H eader C hecksum


V=2

Id e n tific a tio n T im e to L iv e P ro to c o l

P X

CC

M p a y lo a d ty p e

sequence num ber

S o u rc e A d d re s s D e s tin a tio n A d d r e s s

tim e s ta m p SSRC (s y n c h r o n iz a tio n s o u r c e id e n tifie r )

IP over TDM HDLC Packet Structure

NETWORKS

Proprietary Protocol

HDLC flag

Protocol Payload version Type


1 byte

Payload (1.. 1500)

CRC16

1 byte

2 bytes

IP header

UDP/TCP/ SCTP header

VoIP/Data/CCS payload

G.729

- Voice encapsulation to IP

NETWORKS

(80 Samples) x 8 bit bit 640 bit 80 bit

G.729

80

G.729

Compression ratio of 8:1


= 8)

(F

VoIP RTP

Multiplexing Packet Structure

NETWORKS

T.38 Packet

Conventional VoIP Packet


Ethernet (38) IP (20) UDP RTP (8) (12)

Or

Payload (10..320)

66 bytes (Common Overhead)

RTP Multiplexing Packet Structure


Ethernet (38) IP (20) Mini UDP Header (8) (4) RTP (12) Payload (10..320) Mini Header (4) RTP (12) Payload (10..320)

66 bytes (Common Overhead)

Mini Packet

Mini Packet

Evils of VoIP Telephony

NETWORKS

Loss
A certain percent of packets may get lost.

Delay
Delay is crated due to DSP processing, compression and packetization processes and network delay.

Jitter
Packets are received with a variation delay or in different order.

VoIP - Packet Loss

NETWORKS

n ftpk httpj ftpk+1 n+1

Queue in router is full

VoIP - Packet Loss Concealment

NETWORKS

VoIP - Packet Loss Concealment Makes a Difference

NETWORKS

Packet Loss Overcome Using Redundancy

NETWORKS

Sent packets:
n n-1 n+1 n n+2 n+1 n+3 n+2

Received packets:
n n-1 n+1 n n+2 n+1 n+3 n+2

n+1

n+2

n+3

VoIP - What is Jitter

NETWORKS

n n+1 n+2

Transmitted
time, ms

n+3

packet number 20 40 60 80 100

n+4

120

Queue in Router

n ftp
k http j

n n+1 n+2

Received
n+3 n+4

ftpk+ n+ 1 1

packet number

20

40

45

60

80 100

120 time, ms

VoIP - Jitter Management


n n+1 n+2 n+3

NETWORKS

Receiving timing

How to overcome?
Jitter Buffer

packet number 20 40
45

n+4

60

80

100

120

time, ms

n n+1 n+2 n+3

Playback timing

packet number 25 45 65 85 105

n+4

time, 12 ms 5

NETWORKS

I-Gate 4000 XMS - Management over TDM bearer


Confidential

xMS - Management over TDM bearer


NETWORKS

xMS stations use the IP over TDM links for communication with far-end terminals . The management traffic is routed to the target terminal via any IP over TDM link using routing tables in the xMS PC and in the terminal configuration map

Management handling during congestion


NETWORKS

During traffic congestion periods, the management traffic is discarded first. It is transferred to the bearer only using the unused residual bandwidth (CIR = 0)

CIR = Committed Information Rate

Management over Bearer configuration example

NETWORKS

NETWORKS

I-Gate 4000 CCS Compression over TDM Bearer

VERAZ TEAM
Confidential

CCS Compression: ISDN and SS7

NETWORKS

CCS channels SS7 links and ISDN Dchannels, received on the trunk side, are compressed and tunneled to the far end PSTN side. The transmission to the far end terminal is performed using the SCTP protocol.

CCS protocol: SS7 channel compression

NETWORKS

compression

SSP

T1/E1/ DS3/.. I-Gate 1 Packet Network

T1/E1/ DS3/..

SSP

I-Gate 2

MTP3 MTP2

MTP3 MTP2

SS7 Signaling Link

Redundant / repeated FISU messages are removed at the Tx side and reproduced on the Rx side towards the PSTN

CCS protocol: ISDN D-channel compression

NETWORKS

compression

PBX I-Gate 1 T1/E1/ DS3/.. Q.931


LAP-D

CO Packet Network T1/E1/ DS3/.. Q.931


LAP-D

I-Gate 2

ISDN Data Link

HDLC flags are removed at the Tx side and regenerated (reproduced) on the Rx side towards the PSTN

Bandwidth saving and reliable transport protocol

NETWORKS

Use reliability based on non-redundant protocol

SCTP

Signaling has priority over voice Transport only meaningful data


Transfer complete messages (not bits) Remove flags (7E) Remove CRC Remove repeating FISU for SS7 SACK of SCTP SCTP retransmission period calculation Exponential increment when multiple retransmission SCTP feature

Use multiple/selective acknowledgements

Network adaptive

Bundling

Вам также может понравиться