Algorithm beginning of new talk-time-stamps of rtp packets

Assignment Help Basic Computer Science
Reference no: EM1381493

Assume that the sender sends silence suppressed RTP stream of G.711 audio to receiver (G.711 is name of standard for 64Kbps PCM we discussed in class). During talk spurt 20 msecs chunks of quantized audio samples are encapsulated into packets and sent to receiver (every 20 msecs). Explain your answers for the following:

a. Determine samples that are included in each packet?

b. If RTP time stamp is initialized to zero, and if first talk spurt comprises of three or more packets, determine the RTP time stamps of first three packets in first talk spurt (Hint time stamps are relative to first sample)?

c. Consider last packet in talk spurt and first packet in immediately following talk spurt. Does te difference of RTP timestamps of these packets depend on length of silence period between two talk spurts?

d. If last two packets received at receiver have timestamps of 0 and 480 and corresponding sequence numbers of 1 and 3 (i.e. packet 2 is lost), are these last two packets in same talk spurt or in different talk spurts?

e. Explain the algorithm which uses sequence numbers and time stamps of RTP packets to show the beginning of new talk spurt?

Reference no: EM1381493

Questions Cloud

Questions on international sociology : I've employed several of your response from 2012 in my current Sociology class. I was wondering if you could provide me a response to the following questions.
Instruments for determining na+ concentrations : A rather tame ltxnsp was recently found on Easter Island through a retired neurophysiologist. He reported the following measurements of ECF and ICF concentrations
Identify how production processes are organized in a typical : Identify how production processes are organized in a typical manufacturing organization. What are some specific examples?
National security-surveillance : If Arab Americans are monitored by the government, what is to prevent other ethnic groups from being monitored due to real or manufactured threats to national security?
Algorithm beginning of new talk-time-stamps of rtp packets : Explain the algorithm which uses sequence numbers and time stamps of RTP packets to show the beginning of new talk spurt?
Structure of a mammalian hormone oxtocin : The structure of a mammalian hormone oxtocin, a nine-amino acid polypeptide as follows: cys-tur-ile-glan-asn-cys-pro-leu-gly. At the carboxyl end, the -OH is replaced by an amino group.
Individualism and statis : Differentiate (compare or contrast) between individualism and statism. Please reference the textbook with your responses (page numbers are your best friend).
With the growth in modern communication technologies : With the growth in modern communication technologies, such as email and video-conferencing, and the declining costs of international travel
Patriot act infringe on civil rights and liberties : In your opinion, does the Patriot Act infringe on civil rights and liberties? Explain your reasoning, discuss why you do or do not support the Patriot Act, and provide at real-world examples/evidence that support your answer.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Kind of information monitor check to see if it sanitize

Which kind of information should the monitor check to see if it must sanitize the data to conceal the names of the users and the names and addresses of the computers involved?

  Analyze use of databases in business environment

Create the 2-3 page memorandum analyzing use of databases in the business environment. Include what database applications must be used: Microsoft Access, IBM DB2, Oracle, etc.

  Steps to follow to get evidence in investigating files

Drive that you are investigating comprises several password-protected files and other files with headers which do not match extension. What procedures would you require to follow to retrieve evidence?

  Explaining communication methods which are beneficial

What additional communication methods not discussed in the reading do you believe are also beneficial? Explain what they are and how you know about them.

  Find out winner in card game

When there is tie, nobody loses. If first two cards total 8 or 9, hand is called a "natural" and it wins automatically, unless both hands have equal value "naturals", in which case it's a tie.

  Threat to ships-which manufactures have instituted control

Provide two examples of threats to boats/ships for which manufactures and/or regulators have instituted controls. Describe the vulnerabilities for which the controls were created.

  Explaining real-world group support system success stories

Identify one real-world Group Support System success stories (e.g., from vendor Web sites or from reports/articles) and describe them.

  Describing fields and options with user account set-up

Describe the fields and options associated with user account set-up.

  Describe object management group-s purpose-influence on uml

Investigate the Object Management Group (OMG). Discuss your findings. Describe what it is, its purpose, and its influence on UML and the object approach to systems development.

  Writing java code by using netbeans

Write a java code using netbeans for the following program. Write a program that asks the user to enter five test scores.

  Describe factors having greater trust in e-business

Describe the factors which would contribute to you having greater trust in e-business. Do you look for trust seals when shopping online?

  Subsets of integers which sum to the same number

How many numbers do you require from this generator to guarantee that there exist 2 subsets of integers which  sum to the same number? Write steps how derive the solution.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd