Implementation of VOIP Communication on Embedded Systems
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 1
Abstract
In the development of VOIP technology, applications of real-time voice communication has corner into widespread use over the Internet. However, their over reliance on PC environment restricts the applying fields of most VOIP software, and embedded VOIP is one of these blind spots. The VOIP application in this paper sets the hardware foundation on ARM9 embedded platform, adopts SIP and RTP as the transmission protocol and employs CELP compression algorithms to ensure the low-latency and high quality communication. In addition, Linux operating system and ALSA device driver are used to meet the needs of cost control and sound effects. Viewed from the experimental results, the VOIP system proves to be successful in both its real time voice communication.
Authors and Affiliations
Sai Prasanna, S Karunakar
An Effective Approach Of Compressing Encrypted Images
In this paper proposing a novel scheme of scalable coding for encrypted images. In the encryption phase, the original pixel values are masked by a modulo- 256 addition with nonrandom numbers that are derived from a s...
EVS: A Cloud Services Information Security and Privacy Eligibility and Verification System
In recent years, cloud computing services have evolved as a new paradigm for delivering computing resources thatare dynamic and customizable, and providehigh performance. Many organizations are migrating their inform...
Implementation of Grid Based Distributed 3P4W System Using ANFIS Control
The increase in global energy demand and load demand, the Renewable Energy Sources (RES) are increasingly connected in the distribution systems which utilises power electronics Converters/Inverters. This paper sugges...
Methods To Enhance The Security And Embedding Capacity Of Steganography
The major requirement for most of the steganographic method is to improve the security to the hidden data and to enhance the amount of data that can be embedded into the cover medium. The paper mainly studies on the...
Competent Dependable Convergent Key Management for Reliable Deduplication
De-Duplication enhances Storage and data transmission effectiveness is contradictory with conventional encryption. In conventional model encryption requires diverse clients to encode their own information with their...