Transmitting the rtp stream

Assignment Help Computer Engineering
Reference no: EM1323043

Consider that a sender transmits a silence suppressed the RTP stream of G.711 audio to the receiver (G.711 refers to the name of standard for 64Kbps PCM we discussed in class). At a talk spurt 20 m secs chunks of quantized audio samples are encapsulated into the packets and transmitted to the receiver (every 20 m secs). Justify your answers for the following:

a) How many samples are involved in each packet?

b) If RTP time stamp is initialized to the zero, and if the first talk spurt consists of the three or more packets, explain the RTP time stamps of first three packets in the first talk spurt.

c) Let the last packet in the talk spurt and the first packet in the immediately following talk spurt. Does the difference of the RTP timestamps of these packets depend upon the length of silence period between the two talk spurts?

d) If last two packets received at the receiver have the timestamps of 0 and 480 and corresponding sequence numbers of 1 and 3 (i.e. packet 2 is lost), are these last two packets in same talk spurt or in different talk spurts?

e) Outline an algorithm which utilizes the sequence numbers and time stamps of RTP packets to calculate the beginning of a new talk spurt?

Reference no: EM1323043

Questions Cloud

Commercial banking industry in canada is less competitive : The commercial banking industry in Canada is less competitive than the commercial banking industry in the united states
Job dimensions identified by the job characteristics model : What are the five core job dimensions identified by the job characteristics model and How would management apply the job characteristics model?
Determining sampling technique : After polling every 8 th graduate, a major university estimated annual salary of its alumni to be $103,000.  What sampling technique was used?
Knowledge of attitudes and superviosry expectations : Using your knowledge of attitudes and superviosry expectations, develop 2 possible reasons to explain the employees' behavior. If your hypistese are true, How could the HRD manager improve the situation?
Transmitting the rtp stream : Consider that a sender transmits a silence suppressed the RTP stream of G.711 audio to the receiver (G.711 refers to the name of standard for 64Kbps PCM we discussed in class).
Manager of a medium-sized industry which operates : Assume you are the manager of a medium-sized industry which operates in an industry which has a four-industry concentration ratio
Recognizing midpoint of the first class : Recognize the midpoint of the first class. Recognize the class boundaries of the first class.
Two processes are under consideration for a certain product : Two Processes are under consideration for a certain production. Process A needs acquisition of a new machine which is estimated
Assume which the present first generation consists : Assume which the present first generation consists of 1 million people, half of whom are women. If the total fertility rate.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What changes have to be made to accept $ and cents

What changes have to be made to accept $ and cents

  Explain the situation in terms of pci compliance standard

On your exit, a store employee asks to give your receipt and checks all the contents of the store bag. Document each of the above described events that are described and explain them in terms of PCI compliance standard.

  What is the data rate

What is the data rate

  Listing the significant investigative approaches

What do you think are the most significant investigative approaches in preparation for these cyber crime cases and what could be the result of the poor investigator planning and preparation before start of the digital evidence collection, and proc..

  How to write basic structure of an exception handler

How to write basic structure of an Exception handler a. generate an abstract class Furniture b. Declare an abstract process Discount the returns no value but accepts the cost of item

  Why is an object (oop) a module

Why is an object (OOP) a module

  Developing the circuitry for class project

If number is divisable by 4 or 5, number has to be a multiple of 2 in order to generate an output. If the number is devisable by 3, it has to be a multiple of 3 and 5 to generate an output.

  Write down program that models an employee

Write down program that models an employee

  Carrying out the investigation

You work for the mid-size corporation that is known for its inventions that does the lot of work of copyright and patent. You are investigating an employee suspected of selling and distributing animations generated for your corporation.

  Hexadecimal values of dx and ax

Specify the hexadecimal values of DX and AX after the following given instructions have been executed.

  Breach of security

A company has the resource XYZ. If there exist a breach of security, company may face a fine of $100,000 and pay other $20,000 in order to clean up the breach.

  Sha-256 and rc4

SHA-256 (with 256-bit output) is more resistant to the attacks based on birthday paradox than SHA-1. Key reuse is deadly for the stream ciphers such as RC4.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd