Information Technology Reference
In-Depth Information
(a) LC methods
(b) POS mehods
Codec level LC
Packet-stream level LC
Fixed MED
Adaptive MED
Nonredundancy-based
Receiver-based
(no redundancy)
Sender/receiver-based
(partial redundancy)
Redundancy-based
Talk-spurt
based
Packet
based [40]
Design
time
Call
establishment
-Interleaving
-Nonredundant
MDC [27]
Retransmission
-TCP
-ARQ/UDP
-reconstruct based on
partial side info
Sample-based
-Silence substitution [24]
-Comfort noise subs. [24]
-Repetition [26]
-Interpolation [25]
Open-loop
schemes [41]
Closed-loop
schemes
Full protection
-FEC [8], [34]
-Piggybacking [35], [36]
Model-based
-Repetition of codec
parm. [28]
-Interpolation of codec
parm. [27]
-V/UV-based reconstruction
[29], [30]
Partial protection
-UEP [37]
-Redundant MDC [38]
-Layeredcoding-[31-33]
Intermediate
metric [39]
End-to-end
metric [13], [15]
Figure 2.9
A classiication of existing LC and POS methods at (a) the codec and (b) the packet-stream layers.
Search WWH ::




Custom Search