Active concealment for internet speech transmission

Long Le, Henning Sanneck, Georg Carle, Tohru Hoshi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Recently, active networks have been highlighted as a key enabling technology to obtain immense flexibility in terms of network deployment, configurability, and packet processing. Exploiting this flexibility, we present an active network application for real-time speech transmission where plugin modules are downloaded onto certain network nodes to perform application-specific packet processing. In particular, we propose to perform loss concealment algorithms for voice data streams at active network nodes to regenerate lost packets. The regenerated speech data streams are robust enough to tolerate further packet losses along the data path so that the concealment algorithms at another downstream node or at the receiver can still take effect. We call our approach active concealment for speech transmission to distinguish it from concealment performed at the receiver. Our approach is bandwidth-efficient and retains the applications’ end-to-end semantics.

Original languageEnglish
Title of host publicationActive Networks - 2nd International Working Conference, IWAN 2000, Proceedings
EditorsHiroshi Yasuda
PublisherSpringer Verlag
Pages239-248
Number of pages10
ISBN (Electronic)3540411798, 9783540411796
DOIs
StatePublished - 2000
Externally publishedYes
Event2nd International Working Conference on Active Networks, IWAN 2000 - Tokyo, Japan
Duration: 16 Oct 200018 Oct 2000

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1942
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Working Conference on Active Networks, IWAN 2000
Country/TerritoryJapan
CityTokyo
Period16/10/0018/10/00

Fingerprint

Dive into the research topics of 'Active concealment for internet speech transmission'. Together they form a unique fingerprint.

Cite this