Implementation of VOIP Communication on Embedded Systems
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 1
Abstract
In the development of VOIP technology, applications of real-time voice communication has corner into widespread use over the Internet. However, their over reliance on PC environment restricts the applying fields of most VOIP software, and embedded VOIP is one of these blind spots. The VOIP application in this paper sets the hardware foundation on ARM9 embedded platform, adopts SIP and RTP as the transmission protocol and employs CELP compression algorithms to ensure the low-latency and high quality communication. In addition, Linux operating system and ALSA device driver are used to meet the needs of cost control and sound effects. Viewed from the experimental results, the VOIP system proves to be successful in both its real time voice communication.
Authors and Affiliations
Sai Prasanna, S Karunakar
Low-Complexity Turbo Decoder Architecture for Energy-Efficient Wireless Sensor Networks
Turbo codes have recently been considered for energy-constrained wireless communication applications, mainly because of low transmission energy consumption. In this project, we decompose the low complexity turbo deco...
Fuzzy Decision Tree Classification Based On The Peano Count Tree Representation
Image classification is one of the important tasks in remote sensing image interpretation in which the image pixels are classified. Many organizations have large quantities of spatial data collected in various applic...
Hardware Implementation of RFID Collaberal Affirmation Protocol
Radio-frequency identification (RFID) is a free space technology which implements radio communication to identify objects with a specific electrical property. The great in extent deployment of RFID technologies may cr...
Rattle Adversary In IP Address Race Of Puzzler Networks
Large datasets of existent network streams procured from the mutual network are indispensable resource for the exploration group. An application encompasses network modeling and simulation, recognition of privacy ass...
A Protective Scheme To Prevent The Attacker From Forging Acknowledgment Packets In Manets’s Using Eaack
Amongst all the modern wireless networks Mobile Ad hoc network (MANET) is one of the most significant and exclusive applications. MANET does not necessitate a fixed network infrastructure every single node works as b...