分享
 
 
 

RFC741 - Specifications for the Network Voice Protocol (NVP)

王朝other·作者佚名  2008-05-31
窄屏简体版  字體: |||超大  

NWG/RFC741 DC 22 Nov 77 42444

SPECIFICATIONS FOR THE

NETWORK VOICE PROTOCOL (NVP)

and

Appendix 1: The Definition of Tables-Set-#1 (for LPC)

Appendix 2: Implementation Recommendations

NSC NOTE 68

(Revision of NSC Notes 26, 40, and 43)

Danny Cohen, ISI

January 29, 1976

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

CONTENTS

PREFACE iii

ACKNOWLEDGMENTS iv

INTRODUCTION 2

THE CONTROL PROTOCOL 2

Summary of the CONTROL Messages 3

Definition of the CONTROL Messages 4

Definition of the <WHAT> and <HOW>

Negotiation Tables 8

On RENEGOTIATION 10

The Header of Data Messages 10

THE LPC DATA PROTOCOL 13

EXAMPLES FOR THE CONTROL PROTOCOL 15

APPENDIX 1: THE DEFINITION OF TABLES-SET-#1 18

General Comments 20

Comments on the PITCH Table 20

Comments on the GAIN Table 21

Comments on the INDEX7 Table 21

Comments on the INDEX6 Table 21

Comments on the INDEX5 Table 21

The PITCH Table 22

The GAIN Table 24

The INDEX7 Table 25

The INDEX6 Table 26

The INDEX5 Table 27

APPENDIX 2: IMPLEMENTATION RECOMMENDATIONS 28

REFERENCES 30

Cohen [Page ii]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

PREFACE

The major objective of ARPA's Network Secure Communications (NSC)

project is to develop and demonstrate the feasibility of secure,

high-quality, low-bandwidth, real-time, full-duplex (two-way) digital

voice communications over packet-switched computer communications

networks. This kind of communication is a very high priority

military goal for all levels of command and control activities.

ARPA's NSC projrct will supply digitized speech which can be secured

by existing encryption devices. The major goal of this research is

to demonstrate a digital high-quality, low-bandwidth, secure voice

handling capability as part of the general military requirement for

worldwide secure voice communication. The development at ISI of the

Network Voice Protocol described herein is an important part of the

total effort.

Cohen [Page iii]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

ACKNOWLEDGMENTS

The Network Voice Protocol (NVP), implemented first in December 1973,

and has been in use since then for local and transnet real-time voice

communication over the ARPANET at the following sites:

o Information Sciences Institute, for LPC and CVSD, with a

PDP-11/45 and an SPS-41.

o Lincoln Laboratory, for LPC and CVSD, with a TX2 and the

Lincoln FDP, and with a PDP-11/45 and the LDVT.

o Culler-Harrison, Inc., for LPC, with the Culler-Harrison

mp32A and AP-90.

o Stanford Research Institute, for LPC, with a PDP-11/40 and an

SPS-41.

The NVP's success in bridging the differences between the above

systems is due mainly to the cooperation of many people in the

ARPA-NSC community, including Jim Forgie (Lincoln Laboratory), Mike

McCammon (Culler-Harrison), Steve Casner (ISI) and Paul Raveling

(ISI), who participated heavily in the definition of the control

protocol; and John Markel (Speech Communications Research

Laboratory), John Makhoul (Bolt Beranek & Newman, Inc.) and Randy

Cole (ISI), who participated in the definition of the data protocol.

Many other people have contributed to the NVP-based effort, in both

software and hardware support.

Cohen [Page iv]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

1. INTRODUCTION

Currently, computer communication networks are designed for data

transfer. Since there is a growing need for communication of

real-time interactive voice over computer networks, new communication

discipline must be developed. The current HOST-to-HOST protocol of

the ARPANET, which was designed (and optimized) for data transfer,

was found unsuitable for real-time network voice communication.

Therefore this Network Voice Protocol (NVP) was designed and

implemented.

Important design objectives of the NVP are:

- Recovery of loss of any message without catastrophic effects.

Therefore all answers have to be unambiguous, in the sense that

it must be clear to which inquiry a reply refers.

- Design such that no system can tie up the resources of another

system unnecessarily.

- Avoidance of end-to-end retransmission.

- Separation of control signals from data traffic.

- Separation of vocoding-dependent parts from vocoding-independent

parts.

- Adaptation to the dynamic network performance.

- Optimal performance, i.e. guaranteed required bandwidth, and

minimized maximum delay.

- Independence from lower level protocols.

The protocol consists of two parts:

(1) The control protocol,

(2) The data protocol.

Control messages are sent as controlled (TYPE 0/0) messages, and data

messages may be sent as either controlled (TYPE 0/0) or uncontrolled

(TYPE 0/3) messages (see BBN Report 1822 for definition of

MESSAGE-TYPE).

Throughout this document a "Word" means a "16-bit quantity".

Cohen [Page 1]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

2. THE CONTROL PROTOCOL

Throughout this document the 12-bit MESSAGE-ID (see BBN Report 1822)

is referred to as LINK (its 8 MSBs) and SUB-LINK (its 4 LSBs).

The control protocol starts with an initial connection phase on link

377 and continues on other links assigned at run time.

Four links are used for each voice communication:

Link L will be used for control, from CALLER to ANSWERER.

Link K will be used for control, from ANSWERER to CALLER.

Link L+1 will be used for data, from CALLER to ANSWERER.

Link K+1 will be used for data, from ANSWERER to CALLER.

Both L and K should be between 340 and 375 (octal). L and K need not

differ.

The first message (CALLER to ANSWERER) on link 377 indicates which

user wants to talk to whom and specifies K. As a response (on K), the

ANSWERER either refuses the call or accepts it and assigns L.

The CALLER then calls again (this time on link L). The ANSWERER

initiates a negotiation session to verify the compatibility of the

two parties.

The negotiation consists of suggestions put forth by one of the

parties, which are either accepted or rejected by the other party.

The suggesting party in the negotiation is called the NEGOTIATION

MASTER. The other party is called the NEGOTIATION SLAVE. Usually the

ANSWERER is the negotiation master, unless agreed otherwise by the

method described later.

If the negotiation fails, either party may terminate the call by

sending a "GOODBYE". If the negotiation is successfully ended, the

ANSWERER rings bells to draw human attention and sends "RINGING" to

the CALLER. When the call is answered (by a human), a "READY" is sent

to the CALLER and the data starts flowing (on L+1 and K+1). However,

a "READY" can be sent without a preceeding "RINGING".

This bell ringing occurs only after the initial call (not after

renegotiation).

The assignment of L and K cannot be changed after the initial

connection phase.

Only one control message can be sent in a network-message. Extra bits

needed to fill the network-message are ignored.

Cohen [Page 2]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

The length of control messages should never exceed a single-packet

(i.e., 1,007 data bits).

Control messages not recognized by their receiver should be ignored

and should not cause any error condition resuting in termination of

the connection. These messages may result from differences in

implementation level between systems.

SUMMARY OF THE CONTROL MESSAGES

#1 "1,<WHO>,<WHOM>,K"

#2 "2,<CODE>" or only "2"

#3 "3,<WHAT>,<N>,<HOW(1),...HOW(N)>"

#4 "4,<WHAT>,<HOW>"

#5 "5,<WHAT>,<HOW>" or only "5,<WHAT>"

#6 "6,L" or only "6"

#7 "7"

#8 "8"

#9 "9"

#10 "10,<ID>"

#11 "11,<ID>"

#12 "12,<IM>"

#13 "13,<YM>,<OK>"

Cohen [Page 3]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

DEFINITION OF THE CONTROL MESSAGES

#1 CALLING (on 377 and L)

This call is issued first on link 377 and later on link L. Its

format is "1,<WHO>,<WHOM>,K", where <WHO> and <WHOM> are words

which identify respectively the calling party and the party

that is being called, and K is as defined above. The format of

the <WHO> and <WHOM> is:

(HHIIIIIIXXXXXXXX)

where HH are 2 bits identifying the HOST, followed by 6 bits

identifying the IMP, followed by 8 bits identifying the

extension (needed because there may be more than one

communication unit on the same HOST).

The system which sends this message is defined as the CALLER,

and the other system is defined as the ANSWERER.

#2 GOODBYE (TERMINATION, on L or K)

This message has the purpose of terminating calls at any stage.

ICP can be terminated (on K) either negatively by sending

either a single word "2" ("GOODBYE") or the two words

"2,<CODE>", or positively by sending the two words "6,L", as

described later.

After the initial connection phase, calls can be terminated by

either the CALLER (on L) or the ANSWERER (on K). This

termination has two words: "2,<CODE>", where <CODE> is the

reason for the termination, as specified here:

0. Other than the following.

1. I am busy.

2. I am not authorized to talk with you.

3. Request of my user.

4. We believe you are down.

5. Systems incompatibility (NEGOTIATION failure).

6. We have problems.

7. I am in a conference now.

Cohen [Page 4]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

8. You made a protocol error.

#3 NEGOTIATION INQUIRY (on L or K)

Sent by the NEGOTIATION MASTER for compatibility verification.

The format is:

"3,<WHAT>,<LIST-LENGTH>,<HOW-LIST>", meaning

"CAN-YOU-DO,<WHAT>,<LIST-LENGTH>,<HOW-LIST>".

The <HOW-LIST> is a list of pointers into agreed-upon tables,

as shown below.

#4 POSITIVE NEGOTIATION RESPONSE (on L or K)

Sent by the NEGOTIATION SLAVE in response to a NEGOTIATION

INQUIRY. The format is:

"4,<WHAT>,<HOW>", meaning: "I-CAN-DO,<WHAT>,<HOW>".

#5 NEGATIVE NEGOTIATION RESPONSE (on L or K)

Sent by the NEGOTIATION SLAVE in response to a NEGOTIATION

INQUIRY. The format is either:

"5,<WHAT>,0", meaning "I-CAN'T-DO-<WHAT>-IN-ANY-OF-THESE-WAYS",

or: "5,<WHAT>,N", meaning inability to accept any of the

options offered in the INQUIRY, but using "N" as a suggestion

to the ANSWERER about another possibility. Examples are

presented later in this report.

#6 READY (on L or K)

Sent by either party to indicate readiness to accept data. Its

format is "6,L" in the reply to the initial call, and "6"

thereafter.

#7 NOT READY (on L or K)

Sent by either party to indicate unreadiness to accept data. It

is always a single word: "7".

#8 INQUIRY (on L or K)

Sent by either party to inquire about the status of the other.

It is always a single word: "8". It is answered by #6, #7, or

#9.

Cohen [Page 5]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

#9 RINGING (on K)

Sent by the ANSWERER after the negotiations have been

successfully terminated and human permission is needed to

proceed further. The ringing will continue for 10 seconds, and

then stop, UNLESS a #8 is received. This message is always a

single word: "9".

#10 ECHO REQUEST (on L or K)

Sent by whichever party is interested in measuring the network

delays. Its only purpose is to be echoed immediately. The

format is "10,<ID>", where <ID> is any word used to identify

the ECHO.

#11 ECHO (on L or K)

Sent in response to ECHO REQUEST. The format is "11,<ID>",

where <ID> is the word specified by #10. The implementation of

this feature is not compulsory, and no connection should be

terminated due to lack of response to ECHO-REQUEST.

#12 RENEGOTIATION REQUEST (on L or K)

Can be sent by either party at ANY stage after LINKS are agreed

upon. This message consists of the two words "12,<IM>". If the

word <IM> (for I MASTER) is non-zero, the sender of this

message requests to be the NEGOTIATION MASTER. If it is zero,

the receiver of this message is requested to be the NEGOTIATION

MASTER. Renegotiation is described later.

#13 RENEGOTIATION APPROVAL (on L or K)

This message may be sent by either party in response to

RENEGOTIATION REQUEST. It consists of the three words

"13,<YM>,<OK>". If <OK> is non-zero, this is a positive

acknowledgment (approval). If it is zero, this is a negative

acknowledgment (i.e., refusal). <YM> is set to be equal to the

<IM> of #12, for identification purposes.

Messages #7, #8, and #9 are always a single word. Messages #1, #3,

#4, and #5 are several words long. Messages #2 and #6 are either a

single word or two words long. #10, #11 and #12 are always 2 words

long. Message #13 is always 3 words long. Message #1 is always 4

words long.

Message #1 is sent only by the CALLER, #3 only by the NEGOTIATION

MASTER, and #4 and #5 only by the NEGOTIATION SLAVE. Message #9 is

Cohen [Page 6]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

sent only by the ANSWERER. All the other control messages may be

sent by either party.

The last <HOW> which was both suggested by the NEGOTIATION MASTER

(in #3) and accepted by the NEGOTIATION SLAVE (in #4) for each

<WHAT> is assumed to be in use.

Cohen [Page 7]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

DEFINITION OF THE <WHAT> AND <HOW> NEGOTIATION TABLES:

<WHAT> <HOW>

1. VOCODING * 1. LPC

+ 2. CVSD

3. RELP

4. DELCO

2. SAMPLE PERIOD

(in microseconds) N. N (*150) (+62)

3. VERSION

* 1. V1 (see definition below)

+ 2. V2 (see definition below)

4. MAX MSG LENGTH (in bits)

NVP header included N. N (*976 and +976)

(32 bits) but not HOST/IMP

leader and not HOST/IMP padding

5. If LPC:

Degree N. For N coefficients (*10)

If CVSD:

Time Constant

(in milliseconds) N. N (+50)

6. Samples per Parcel N. N (*128) (+224)

7. If LPC:

Acoustic Coding * 1. SIMPLE (see below)

2. OPTIMIZED

8. If LPC:

Info Coding * 1. SIMPLE (see below)

2. OPTIMIZED

Cohen [Page 8]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

9. If LPC:

Pre-emphasis N. N (*58, for

1 - mu x [Z**-1] mu = 58/64 = 0.90625)

N = 64 x mu

10. If LPC:

Table-set N. N (*1)

See definition of Set #1

in Appendix 1

(* indicates recommended options for LPC)

(+ indicates recommended options for CVSD)

No parameter (<WHAT>) should be inquired about by the NEGOTIATION

MASTER if some option (<HOW>) for it has been previously accepted

by the NEGOTIATION SLAVE implicitly in the "VERSION". The purpose

of this restriction is to avoid a possible conflict between

individual parameters and the VERSION-option.

Version 1 (V1) is defined as:

1-1 LPC

2-150 150 microseconds sampling

3-1 V1

5-10 10 coefficients

6-128 128 samples per parcel

7-1 SIMPLE acoustic coding

8-1 SIMPLE information coding

9-58 mu = 58/64 = 0.90625

10-1 Tables set #1

Version 2 (V2) is defined as:

1-2 CVSD

2-62 62 microseconds sampling (16 KHz sampling)

3-2 V2

5-50 50 msec time constant

6-192 192 samples per parcel

Note that this defines every negotiated parameter, except MAX

MSG LENGTH.

SIMPLE and OPTIMIZED codings will be described below in Section

3.

All the negotiation is managed by the NEGOTIATION MASTER, who

decides how much negotiation is needed, and what to do in case

Cohen [Page 9]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

some discrepancy (incompatibility) is discovered: either to try

alternative options or to abort the connection. Upon completion

of successful negotiation, the NEGOTIATION MASTER sends either

#9 (RINGING) only if it is the ANSWERER and if this is an

initial connection, else it sends #6 (READY-FOR-DATA), and

probably inquires with #8 about the readiness of the other

party. The inquiries (#8) before the successful completion of

the negotiation are ignored. However, these inquiries after the

first RINGING (#9) and before the first READY (#6) are needed

to keep the ANSWERER ringing.

Note that the negotiation process can be shortened by using the

VERSION option, as shown in the examples that follow.

ON RENEGOTIATION

At any stage after links are agreed upon, either party might

request a RENEGOTIATION. If the request is approved by the other

party, either party might become the NEGOTIATION MASTER, depending

on the type of renegotiation request. When renegotiation starts,

no previously negotiated agreements (except LINK numbers) hold,

and all items have to be renegotiated from scratch. Note that

renegotiation may entirely replace the negotiation phase and

allows the CALLER to be the NEGOTIATION MASTER.

Upon issuance (or reception) of RENEGOTIATION REQUEST, all data

messages are ignored until the positive indication of the

successful completion of the renegotiation (#6).

After the completion of renegotiation, the frame-count (see the

section on MESSAGE-HEADER) may be reset to zero.

THE HEADER OF DATA MESSAGES

Data messages are the messages which contain vocoded speech. The

first 32 bits of each data message is the MESSAGE-HEADER, which

carries sequence and timing information as described below.

For each vocoding scheme a "FRAME" is defined as the transmission

interval (as agreed upon at the negotiation stage in <WHAT#6>).

Since this interval is defined by the number of samples, its

duration can be found by multiplying the sampling period <WHAT#2>

by the interval length (in samples) <WHAT#6>. For example, in V1

the sampling period is 150 microseconds and the transmission

interval is 128 samples, which yields:

128*150 microseconds = 19.2 milliseconds.

The data describing a FRAME is called a PARCEL. Each parcel has a

Cohen [Page 10]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

serial number. The first parcel created after the completion of

the negotiation (or every RENEGOTIATION) has the serial number

zero. Each message contains an integral number of parcels.

The serial number of the first parcel in the message is put in the

first 16 bits of the message and is referred to as the

MESSAGE-TIME-STAMP. Note that this time stamp is synchronized with

the data stream. Note also that these 16 bits are actually the

third word of the message, following the 2 words used as

IMP-to-HOST leader (see BBN Report 1822).

The next bit in the header is the WE-SKIPPED-PARCELS bit, which is

described later. The next 7 bits tell how many parcels there are

in the message; this number is called the COUNT, or the

PARCEL-COUNT.

Note that if message number N has the time stamp T(N) and the

count C(N), then T(N+1) must be greater than or equal to

T(N)+C(N). Usually T(N+1) = T(N)+C(N), unless the XMTR decided not

to send some parcels due to silence. If this happens then the

WE-SKIPPED-PARCELS bit is set to ONE, else it is set to ZERO.

Hence, if T(N+1) is found by the RCVR to be greater than T(N)+C(N)

and the WE-SKIPPED-PARCELS is zero, some message must be lost.

Note that by definition the time stamps on messages monotonically

increase, except for wrap-around.

The message header structure is illustrated by the following

diagram:

WORD 1 WORD 2 WORD 3 WORD 4

!................!................!................!................!...

!P000TTTTHHIIIIII!LLLLLLLLZZZZZZZZ!TTTTTTTTTTTTTTTT!WCCCCCCCssSSSSSS!DDD

!................!................!................!^...............!...

!<--HOST/IMP-OR-IMP/HOST-LEADER-->!<--TIME-STAMP-->!^<COUNT><-SAVE->!<-D

^

WE-SKIPPED-PARCELS

P = PRIORITY (one bit = 1)

T = MESSAGE TYPE (4 bits = 0011)

L = link ("L" OR "K", 8 bits, greater than 337 octal)

D = data bits (from here to the end of the message)

ZZZZZZZZ = 8 ZERO bits

HHIIIIII = HOST (8 bits, destination or source)

CCCCCCC = parcel COUNT (7 bits)

SSSSSSSS = 8 bits saved for future applications

TTTTTTTTTTTTTTTT = TIME STAMP (16 bits)

Cohen [Page 11]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

The first parcel sent by either party after the NEGOTIATION or

RENEGOTIATION should have the serial number set to zero.

During silence periods, the XMTR might send a "6" or "7"

message periodically. If it does not do so, the RCVR might

interrogate the livelihood of the XMTR by sending periodically

"8" ("ARE-YOU-THERE?") or #10 (ECHO-REQUEST) messages.

Cohen [Page 12]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

3. THE LPC DATA PROTOCOL

The DATA sent at each transmission interval is called a PARCEL.

Network messages always contain an integral number of PARCELs.

There are two independent issues in the coding. One is, obviously,

the acoustic coding, i.e., which parameters have to be transmitted.

SIMPLE acoustic coding is sending all the parameters at every

transmission interval. OPTIMIZED acoustic coding sends only as little

as acoustically needed. DELCO is an example of OPTIMIZED acoustic

coding.

In this document only the format of the SIMPLE acoustic coding is

defined.

All the transmitted parameters are sent as pointers into agreed-upon

tables. These tables are defined as two lists of values. The

transmitter table {X(J)} is used in the following way: The value V is

coded as the code J if X(J-1) < V =< X(J). The receiver table {R(J)

is used to retrieve the value R(J) if the code J was received. X(-1)

is implicitly defined as minus-infinity, and X(Jmax) is eXPlicitly

defined as plus-infinity.

For each parameter, {X(J)} and {R(J)} may be defined independently.

The second coding issue is the information coding technique. The

SIMPLE (information-wise) way of sending the information is to use

binary coding for the codes representing the parameters. The

OPTIMIZED way is to compute distributions for each parameter and to

define the appropriate coding. It is very probable that the PITCH and

GAIN will be decoded absolutely in the first PARCEL of each message,

and incrementally thereafter.

At present, only the SIMPLE (information-wise) coding is used.

The details of the LPC data protocol and its Tables-Set-#1 can be

found in Appendix 1.

Cohen [Page 13]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

Following is the definition for the format of the SIMPLE-SIMPLE

coding, according to Tables-Set-#1:

For each parcel:

PITCH 6 bits (PITCH=0 for UNVOICED)

GAIN 5 bits

I(1) 7 bits

I(2) 7 bits

I(3) 6 bits

I(4) 6 bits

I(5) 5 bits

I(6) 5 bits

I(7) 5 bits

I(8) 5 bits

I(9) 5 bits

I(10) 5 bits

where each of the I(j) is an index for inverse sine coding. If

K(j)=arcsin(Theta(j)) and N bits are assigned for its transmission,

then I(j)=(Theta(j)/Pi)*2**N.

Hence at each transmission interval (128 samples times 150

microseconds) 67 bits are sent, which results in a data rate of 3490

bps. Since this bandwidth is well within the capabilities of the

network, SIMPLE-SIMPLE coding is used, which requires the least

computation by the hosts. Note that this data rate is a peak rate,

without the use of silence.

Cohen [Page 14]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

4. EXAMPLES FOR THE CONTROL PROTOCOL

Here is an example for a connection:

(377) C: 1,<WHO>,<WHOM>,340 Please talk to me on 340/341.

(340) A: 2,1 I refuse, since I'm busy.

Another example:

(377) C: 1,<WHO>,<WHOM>,360 Please talk to me on 360/361.

(360) A: 6,350 OK. You talk to me on 350/351.

(350) C: 1,<WHO>,<WHOM> I want to talk to you.

(360) A: 3,1,1,2 Can you do CVSD? (ANSWERER tries

to be the NEGOTIATION MASTER)

(350) C: 12,1 I want to be it.

(360) A: 13,1 That's OK with me.

(350) C: 3,1,1,2 Can you do CVSD?

(360) A: 5,1,1 No, but I can do LPC.

(350) C: 3,1,1,3 Can you do RELP?

(360) A: 5,1,1 No, but I can do LPC.

(350) C: 3,1,1,1 How about LPC?

(360) A: 4,1,1 LPC is fine with me.

(350) C: 3,2,1,150 Can you use 150 microseconds

sampling?

(360) A: 4,2,150 I can use 150 microseconds.

(350) C: 3,4,3,976,1040,2016 Can you use 976, 1040, or 2016

bits/msg?

(360) A: 4,4,976 I can use 976.

(350) C: 3,5,1,10 Can you send 10 coefficients?

(360) A: 4,5,10 I can send 10.

Cohen [Page 15]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

(350) C: 3,6,1,64 Can you use a 64 sample

transmission?

(360) A: 4,6,64 I can use 64.

(350) C: 3,7,2,1,2 SIMPLE or OPTIMIZED acoustic

coding?

(360) A: 4,7,2 OPTIMIZED!

(350) C: 3,8,1,1 Can you do SIMPLE info coding?

(360) A: 4,8,1 I can do SIMPLE.

(350) C: 3,9,1,58 mu = 0.90625?

(360) A: 4,9,58 Fine with me.

(350) C: 3,10,1 Table set #1?

(360) A: 4,10,1 Of course!

(350) C: 6 I am ready. (Note: No "RINGING"

sent)

(350) C: 8 And you?

(360) A: 6 I am ready, too.

....... Data is exchanged now,

....... on 351 and 361.

(350) C: 10,1234 Echo it, please.

(360) A: 11,1234 Here it comes!

.......

(360) A: 10,3333 Now ANSWERER wants to measure

(350) C: 11,3333 ...the delays, too.

.......

(???) X: 2,3 Termination by either user.

Cohen [Page 16]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

Another example:

(377) C: 1,<WHO>,<WHOM>,360 Please talk to me on 360/361.

(360) A: 6,340 Fine. You send on 340/341.

(340) C: 1,<WHO>,<WHOM> I want to talk to you.

(360) A: 3,3,1,1 Can you use V1?

(340) C: 4,3,1 Yes, V1 is OK.

(360) A: 3,4,1,1984 Can you use up to 1984 bits/msg?

(340) C: 5,4,976 No, but I can use 976.

(360) A: 3,4,1,976 Can you use up to 976 bits/msg?

(340) C: 4,4,976 I can use 976.

(360) A: 9 Ringing (note how short this

negotiation is!!).

.......

(340) C: 8 Still there?

(360) A: 9 Still ringing.

.......

(340) C: 8 Still there?

(360) A: 9 Still ringing.

.......

(340) C: 8 How about it?

(360) A: 9 Still ringing.

(340) C: 2 Forget it! (No reason given.)

Cohen [Page 17]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

APPENDIX 1

THE DEFINITION OF:

TABLES-SET-#1

by

John D. Markel

Speech Communication Research Laboratory

Santa Barbara, California

Cohen [Page 18]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

TABLES-SET-#1

This set includes tables for:

PITCH - 64 values, PITCH table

GAIN - 32 values, GAIN table

I( 1) - 128 values, INDEX7 table

I( 2) - 128 values, INDEX7 table

I( 3) - 64 values, INDEX6 table

I( 4) - 64 values, INDEX6 table

I( 5) - 32 values, INDEX5 table

I( 6) - 32 values, INDEX5 table

I( 7) - 32 values, INDEX5 table

I( 8) - 32 values, INDEX5 table

I( 9) - 32 values, INDEX5 table

I(10) - 32 values, INDEX5 table

These tables are defined specifically for a sampling period of 150

microseconds.

Cohen [Page 19]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

GENERAL COMMENTS

The following tables are arranged in three columns, {X(j)}, {j},

and {R(j)}. Note that the entries in the {X(j)} column are half a

step off the other columns. This is to indicate that INTERVALS

from X-domain (pitch, gain, and the Ks) are mapped into CODES {j},

which are transmitted over the network, to be translated by the

receiver into the {R(j)}. These intervals are defined as

OPEN-CLOSE intervals. For example, the PITCH value (at the

transmitter) of 4131 belongs to the interval "(4024,4131]", hence

it is coded as j=6 which is mapped by the receiver to the value

21. Similarly, the value of 2400 for INDEX7 is found to belong to

the interval "(2009,2811]", coded into the CODE 3 and mapped back

into 2411.

Note that if N bits are used by a certain CODE, then there are

2**N+1 entries in the X-table, but only 2**N entries in the

R-table.

The transformation values used for PITCH, GAIN, and the

K-parameters (in the X- and R-tables) are as defined in NSC Note

42.

Values above and below the range of the X-table are mapped into

the maximum and minimum table indices, respectively.

Note that R(J) of INDEX5 is identical to R(2J) of INDEX6, and that

R(J) of INDEX6 is identical to R(2J) of INDEX7. Therefore, it is

possible to store only the R-table of INDEX7, without the R-tables

of INDEX5 and INDEX6.

In the SPS-41 implementation there is no need to store any R-table

for the K-parameters. The transmitted index can be used directly

(with the appropriate scaling) as an index into the SPS built-in

TRIG tables.

COMMENTS ON THE PITCH TABLE

The level J=0 defines the UNVOICED condition. The receiver maps it

into the number of samples per frame (here 128).

This PITCH table differs significantly from previous tables and

supersedes the table published in NSC Note 36. Details of the

calculation of the table can be found in NSC Note 42. Immediate

questions should be referred to John Markel.

Cohen [Page 20]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

COMMENTS ON THE GAIN TABLE

The level J=0 defines absolute silence.

This table is designed for a maximum of 12-bit A/D input, and

allows for a dynamic range of 43.5 dB.

NSC Notes 36, 45, 56 and 58 supply background for the GAIN table.

Gain is the energy of the pre-emphasized, windowed signal.

This table is the NEW GAIN table. NSC Notes 56 and 58 explain the

reasoning behind the NEW GAIN.

COMMENTS ON THE INDEX7 TABLE

Positive values are coded into the range [0-63, decimal]. Negative

values are coded into the 7-bits two's complement of the codes of

their absolute value [65-127, decimal].

Note that all values -403 < V < 403 are coded as (and mapped into)

0. Note also that the code -64 (100 octal) is never used.

In SPS-41 implementation, the R-table is not needed, since

TRIG(2J) is the needed value R(J).

COMMENTS ON THE INDEX6 TABLE

Positive values are coded into the range [0-31, decimal]. Negative

values are coded into the 6-bits two's complement of the codes of

their absolute values [33-63, decimal].

Note that all values -805 < V < 805 are coded as (and mapped into)

0. Note also that the code -32 (40 octal) is never used.

In SPS-41 implementation, the R-table is not needed, since

TRIG(4J) is the needed value R(J).

COMMENTS ON THE INDEX5 TABLE

Positive numbers are coded into the range [0-15, decimal].

Negative numbers are coded into the 5-bits two's complement of

their absolute values, i.e., [17-31, decimal].

Note that all values -1609 < V < 1609 are coded as (and mapped

into) 0. Note also that the code -16 (20 octal) is never used.

In SPS-41 implementation, the R-table is not needed, since

TRIG(8J) is the needed value R(J).

Cohen [Page 21]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

THE PITCH TABLE (as of 10-29-74)

X(J) J R(J) X(J) J R(J) X(J) J R(J)

0 6002 10770

0 128* 21 33 42 61

0 6168 11080

1 18 22 34 43 63

3630 6338 11399

2 19 23 35 44 65

3724 6515 11728

3 19 24 36 45 67

3821 6696 12067

4 20 25 37 46 69

3921 6883 12417

5 20 26 38 47 71

4024 7075 12776

6 21 27 39 48 73

4131 7274 13147

7 22 28 40 49 75

4240 7478 13529

8 22 29 41 50 77

4353 7689 13922

9 23 30 43 51 80

4469 7905 14327

10 24 31 44 52 82

4588 8129 14745

11 24 32 45 53 85

4711 8359 15175

12 25 33 47 54 87

4838 8596 15618

13 26 34 48 55 90

4969 8840 16075

14 27 35 50 56 93

5104 9092 16545

15 27 36 51 57 95

5242 9351 17029

16 28 37 53 58 98

5385 9618 17529

17 29 38 54 59 101

5533 9894 18043

18 30 39 56 60 104

5684 10177 18572

19 31 40 57 61 107

5841 10469 19118

20 32 41 59 62 111

6002 10770 19681

63 114

infinity

Cohen [Page 22]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

Note: This table has only 58 different intervals defined, since 5

values are repeated in the R(j) table.

* This value is the "Transmission Interval" (measured in samples)

as defined in item #6 of the NEGOTIATION.

Cohen [Page 23]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

THE GAIN TABLE (as of 9-17-75)

X(J) J R(J) X(J) J R(J)

0 225

0 0 16 245

20 266

1 20 17 289

22 315

2 24 18 342

26 372

3 28 19 404

30 439

4 33 20 478

36 519

5 39 21 565

42 614

6 46 22 667

50 725

7 54 23 789

59 857

8 64 24 932

70 1013

9 76 25 1101

83 1197

10 90 26 1301

98 1415

11 106 27 1538

116 1672

12 126 28 1818

137 1976

13 148 29 2148

161 2335

14 175 30 2539

191 2760

15 207 31 3000

255 infinity

Cohen [Page 24]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

INDEX7 TABLE (as of 9-23-74)

X(J) J R(J) X(J) J R(J) X(J) J R(J)

0 15800 27897

0 0 21 16151 42 28106

402 16500 28311

1 804 22 16846 43 28511

1206 17190 28707

2 1608 23 17531 44 28899

2009 17869 29086

3 2411 24 18205 45 29269

2811 18538 29448

4 3212 25 18868 46 29622

3612 19195 29792

5 4011 26 19520 47 29957

4410 19841 30118

6 4808 27 20160 48 30274

5205 20475 30425

7 5602 28 20788 49 30572

5998 21097 30715

8 6393 29 21403 50 30853

6787 21706 30986

9 7180 30 22006 51 31114

7571 22302 31238

10 7962 31 22595 52 31357

8351 22884 31471

11 8740 32 23170 53 31581

9127 23453 31686

12 9512 33 23732 54 31786

9896 24008 31881

13 10279 34 24279 55 31972

10660 24548 32058

14 11039 35 24812 56 32138

11417 25073 32214

15 11793 36 25330 57 32286

12167 25583 32352

16 12540 37 25833 58 32413

12910 26078 32470

17 13279 38 26320 59 32522

13646 26557 32568

18 14010 39 26791 60 32610

14373 27020 32647

19 14733 40 27246 61 32679

15091 27467 32706

20 15447 41 27684 62 32729

15800 27897 32746

63 32758

infinity

Cohen [Page 25]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

INDEX6 TABLE (as of 9-23-74)

X(J) J R(J) X(J) J R(J)

0 22595

0 0 16 23170

804 23732

1 1608 17 24279

2411 24812

2 3212 18 25330

4011 25833

3 4808 19 26320

5602 26791

4 6393 20 27246

7180 27684

5 7962 21 28106

8740 28511

6 9512 22 28899

10279 29269

7 11039 23 29622

11793 29957

8 12540 24 30274

13279 30572

9 14010 25 30853

14733 31114

10 15447 26 31357

16151 31581

11 16846 27 31786

17531 31972

12 18205 28 32138

18868 32286

13 19520 29 32413

20160 32522

14 20788 30 32610

21403 32679

15 22006 31 32729

22595 infinity

Cohen [Page 26]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

INDEX5 TABLE (as of 9-23-74)

X(J) J R(J) X(J) J R(J)

0 22006

0 0 8 23170

1608 24279

1 3212 9 25330

4808 26320

2 6393 10 27246

7962 28106

3 9512 11 28899

11039 29622

4 12540 12 30274

14010 30853

5 15447 13 31357

16846 31786

6 18205 14 32138

19520 32413

7 20788 15 32610

22006 infinity

Cohen [Page 27]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

APPENDIX 2

IMPLEMENTATION RECOMMENDATIONS

(1) It is recommended that the priority-bit be turned ON in the

HOST/IMP header.

(2) It is recommended that in all abbreviations, "R" be used for

Receiver and "X" for Transmitter.

(3) The following identifiers and values are recommended for

implementations:

SLNCTH 30 SILENCE-THRESHOLD.

Used for LONG-SILENCE definition. See below. Measured in the

same units as GAIN, in its X-table.

TBS 1.000 sec TIME-BEGIN-SILENCE.

LONG-SILENCE is declared if GAIN<SLNCTH for more than TBS.

TAS 0.500 sec TIME-AFTER-SILENCE.

A delay introduced by the receiver after the end of

LONG-SILENCE, before restarting the playback.

TES 0.150 sec TIME-END-SILENCE.

The amount of time the transmitter backs up at the end of a

LONG-SILENCE in order to ensure a smooth transition back to

speech.

TRI 2.000 sec TIME-RESPONSE-INITIAL.

Time for waiting for response for an initial call (#1 and #3).

The initial call is repeated every TRI until an answer arrives,

or until TRIGU expires.

TRIGU 20.000 sec TIME-RESPONSE-INITIAL-GIVEUP.

If no response to an initial call is received within TRIGU

after the FIRST initial call, the system gives up, assuming the

other system is down.

TRQ 1.000 sec TIME-RESPONSE-INQUIRY.

If no response to an inquiry (#8) is received within TRQ, the

inquiry is repeated.

Cohen [Page 28]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

TRQGU 10.000 sec TIME-RESPONSE-INQUIRY-GIVEUP.

If no response to an inquiry is received within TRQGU from the

FIRST inquiry, the system gives up, assuming the other system

is down.

TBDA 3.000 sec TIME-BETWEEN-DATA-ARRIVAL.

If no data arrives within TBDA, an INQUIRY (#8) is sent. This

repeats every TBDA.

TNR 2.000 sec TIME-NOT-READY.

If the other system is in the NOT-READY (#7) state for more

than TNR, an INQUIRY (#8) is sent. This repeats every TNR.

TNRGU 10.000 sec TIME-NOT-READY-GIVEUP.

If the other system is in the NOT-READY (#7) state for more

than TNRGU, then the system gives up, assuming the other

system is down.

TBIN 3.000 sec TIME-BUFFER-IN.

The input buffer size is equivalent to the time period TBIN

(and its size is the DATA-RATE multiplied by the period

TBIN). If the INPUT QUEUE ever gets to be longer than TBIN,

data is discarded.

TBOUT 3.000 sec TIME-BUFFER-OUT.

The output buffer size is equivalent to the time period TBOUT

(and its size is the DATA-RATE multiplied by the period

TBOUT). If the OUTPUT QUEUE ever gets to be longer than

TBOUT, data is discarded.

Cohen [Page 29]

NWG/RFC741 DC 22 Nov 77 42444

Specifications for the Network Voice Protocol (NVP)

REFERENCES

Bolt Beranek & Newman, Inc., Report No. 1822, Interface Message

Processor: Specifications for the Interconnection of a Host and an

IMP.

NSC Note 42 (in progress).

NSC Note 36, Proposal for NSC-LPC Coding/Decoding Tables, by J. D.

Markel, Speech Communications Research Laboratory, Inc., July 20,

1974.

NSC Note 45, Everything You Always Wanted to Know about Gain, by E.

Randolph Cole, USC/Information Sciences Institute, October 11, 1974.

NSC Note 56, Nothing to Lose, but Lots to Gain, by John Makhoul and

Lynn Cosell, Bolt Beranek & Newman, Inc., March 10, 1975.

NSC Note 58, Gain Again, by Randy Cole, USC/Information Sciences

Institute, March 12, 1975.

 
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
2023年上半年GDP全球前十五强
 百态   2023-10-24
美众议院议长启动对拜登的弹劾调查
 百态   2023-09-13
上海、济南、武汉等多地出现不明坠落物
 探索   2023-09-06
印度或要将国名改为“巴拉特”
 百态   2023-09-06
男子为女友送行,买票不登机被捕
 百态   2023-08-20
手机地震预警功能怎么开?
 干货   2023-08-06
女子4年卖2套房花700多万做美容:不但没变美脸,面部还出现变形
 百态   2023-08-04
住户一楼被水淹 还冲来8头猪
 百态   2023-07-31
女子体内爬出大量瓜子状活虫
 百态   2023-07-25
地球连续35年收到神秘规律性信号,网友:不要回答!
 探索   2023-07-21
全球镓价格本周大涨27%
 探索   2023-07-09
钱都流向了那些不缺钱的人,苦都留给了能吃苦的人
 探索   2023-07-02
倩女手游刀客魅者强控制(强混乱强眩晕强睡眠)和对应控制抗性的关系
 百态   2020-08-20
美国5月9日最新疫情:美国确诊人数突破131万
 百态   2020-05-09
荷兰政府宣布将集体辞职
 干货   2020-04-30
倩女幽魂手游师徒任务情义春秋猜成语答案逍遥观:鹏程万里
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案神机营:射石饮羽
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案昆仑山:拔刀相助
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案天工阁:鬼斧神工
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案丝路古道:单枪匹马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:与虎谋皮
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:李代桃僵
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:指鹿为马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:小鸟依人
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:千金买邻
 干货   2019-11-12
 
推荐阅读
 
 
 
>>返回首頁<<
 
靜靜地坐在廢墟上,四周的荒凉一望無際,忽然覺得,淒涼也很美
© 2005- 王朝網路 版權所有