home *** CD-ROM | disk | FTP | other *** search
Text File | 1993-08-15 | 44.5 KB | 1,255 lines |
- C:\WINWORD\CCITTREC.DOT_______________
-
-
-
-
-
-
-
- INTERNATIONAL TELECOMMUNICATION UNION
-
-
-
-
-
-
-
- CCITT G.764
-
- THE INTERNATIONAL
- TELEGRAPH AND TELEPHONE
- CONSULTATIVE COMMITTEE
-
-
-
-
-
-
-
-
-
-
-
- GENERAL ASPECTS OF DIGITAL
- TRANSMISSION SYSTEMS;
- TERMINAL EQUIPMENTS
-
-
-
- VOICE PACKETIZATION û
- PACKETIZED VOICE PROTOCOLS
-
-
-
-
-
-
-
- Recommendation G.764
-
-
-
-
-
- Geneva, 1990
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Printed in Switzerland
-
-
-
-
-
- FOREWORD
-
- The CCITT (the International Telegraph and Telephone Consultative
- Committee) is a permanent organ of the International Telecommuni-
- cation Union (ITU). CCITT is responsible for studying technical,
- operating and tariff questions and issuing Recommendations on them
- with a view to standardizing telecommunications on a worldwide
- basis.
-
- The Plenary Assembly of CCITT which meets every four years,
- establishes the topics for study and approves Recommendations pre-
- pared by its Study Groups. The approval of Recommendations by the
- members of CCITT between Plenary Assemblies is covered by the
- procedure laid down in CCITT Resolution No. 2 (Melbourne, 1988).
-
- Recommendation G.764 was prepared by Study Group XV and was
- approved under the Resolution No. 2 procedure on the 14 of December
- 1990.
-
-
-
-
-
- ___________________
-
-
-
-
-
- CCITT NOTE
-
- In this Recommendation, the expression ôAdministrationö is used for
- conciseness to indicate both a telecommunication Administration and
- a recognized private operating agency.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- πITU1990
-
- All rights reserved. No part of this publication may be reproduced or uti-
- lized in any form or by any means, electronic or mechanical, including pho-
- tocopying and microfilm, without permission in writing from the ITU.
-
- PAGE BLANCHE
-
- Recommendation G.764
-
- Recommendation G.764
-
- VOICE PACKETIZATION û PACKETIZED VOICE PROTOCOLES
-
- 1 Introduction
-
- This Recommendation defines a packet voice protocol for speech
- packetization in permanent virtual circuit applications. The principal appli-
- cation of the packetized voice protocol (PVP) is at the primary rate and in
- fractional primary rate applications.
-
- The protocol defines formats and procedures for the transport of voice
- information and channel associated signalling over a wideband packet net-
- work.
-
- The Recommendation accommodates additional future types includ-
- ing optional internetworking capabilities with the digital cellular radio net-
- working applications currently under development. The extension of this
- Recommendation for baseband facsimile traffic is currently under study.
-
- This Recommendation does not address performance issues.
-
- This Recommendation does not address methods for coding speech
- samples, although particular recommended coding algorithms are specified
- in the protocol (e.g. the algorithms in RecommendationG.726). In particu-
- lar, the Recommendation allows dynamic bandwidth allocation and graceful
- congestion control when the speech samples are coded with embedded algo-
- rithms such as those specified in RecommendationG.727.
-
- This Recommendation does not address the following issues:
-
- 1) services based on the interface;
-
- 2) implementation techniques;
-
- 3) performance guidelines relative to the use of packetized speech;
-
- 4) equipment aspects;
-
- 5 trunk signalling, link establishment and call establishment proce-
- dures for switched virtual circuits;
-
- 6) data only issues, combined data/voice issues and frame relay issues;
-
- 7) speech packetization in Asynchronous Transfer Mode (ATM) (B-
- ISDN) systems.
-
- 2 Overview
-
- This Recommendation contains the specification of a protocol for
- packetized speech (PVP). PVP defines formats and procedures for the trans-
- port of voice information and channel associated signalling over a packet
- network.
-
- Before packetization, the input speech samples may be coded at the
- originating endpoint of the transmitting side by one of the coding methods
- indicated in this document. The stream of coded speech is transformed into
- packets with the format specified in this document. The samples are col-
- lected over a period of 16ms and divided into blocks of 128bits each.
- Silent intervals may be removed. The blocks are arranged to facilitate block
- dropping.
-
- Periods of activity and inactivity are respectively called ôburstsö and
- ôgapsö. It is not necessary to transmit packets during gaps.
-
- The terminating end at the receiving side reconstructs a continuous
- stream of speech from the incoming packets using the information in the
- packet header. The build-out delay procedure described in this document
- compensates for the variable delay that packets may experience within the
- network. Packets that arrive before their scheduled play-out time are placed
- in the proper sequence in a packet queue. Packets that arrive after their
- scheduled play-out time are discarded. The voice packet header contains
- information about the level of noise that was measured by the originating
- endpoint. The terminating endpoint uses this information to play out a
- matching noise level.
-
- An additional feature of PVP is the ability to drop blocks from a
- packet as a congestion control mechanism. The n-thblock consists of the n-
- thbit from each sample collected during the sampling interval. The packet
- header indicates the number of droppable blocks contained in the packet.
- Congested nodes may use this information to drop the least significant block
- from packets to abate the congested state.
-
- The signalling associated with each voice connection shall be trans-
- ported in signalling packets. Signalling packets shall be sent separately on a
- different logical channel. Transport of the signalling information requires a
- set of procedures, similar to those for voice transport, which are described in
- this document.
-
- Note û In a national network, the time stamp (TS) and the build-out
- procedures of ºº 5.1.1, 5.2 and 6.3 may be replaced by a fixed-delay for the
- first packet. At the originating end, the TS will be set to zero. In an interme-
- diate node, the TS field will not be updated. However, the build-out proce-
- dure will be used always on network-network and user-network interfaces.
-
- 3 Formats
-
- 3.1 Physical layer
-
- For operations at 1536 kbit/s or 1920 kbit/s, the electrical characteris-
- tics and formats of the interface are those defined in
- RecommendationsG.703, G.704 and I.431 for the primary rates of
- 1544kbit/s and 2048kbit/s, respectively. The packetized signal consists of
- one digital stream sent over conventional primary rate facilities. Hybrid sit-
- uations containing one or more N┤64kbit/s packet streams and
- Mconventional 64kbit/s channels are also considered.
-
- 3.1.1 Bit inversion
-
- For primary rate applications that require code restrictions that main-
- tain one's density, bit inversion is necessary so that the combined result of
- bit stuffing and bit inversion is to prevent the all 0 octet and to satisfy the
- one's density requirements of restricted DS1 facilities.
-
- 3.1.2 Order of transmission
-
- Bit 1 is the least significant bit (LSB) and is transmitted first. Bit 8 is
- the most significant bit (MSB) and is transmitted last.
-
- 3.2 Link layer
-
- The link layer of PVP uses a similar approach to
- RecommendationQ.921/I.441 with the additions indicated in this Recom-
- mendation. Frames that transport voice and frames that transport channel
- associated signalling are assigned different layer2 addresses, i.e.they are
- carried on two separate logical links. This, together with the use of a differ-
- ent unnumbered frame type for each type of traffic, provides an additional
- measure of security to protect from the misrouting of signalling information.
-
- 3.2.1 Address field
-
- The address field is two octets in length with the first bit of each
- defined as an extension bit and bit 2 of octet 1 defined as the command/
- response (C/R) bit. The 13 bits that remain are concatenated to form a single
- data link connection identifier (DLCI). Address assignment starts with 128
- and ends with 8063. Layer 2 addresses are already assigned and the imple-
- mentation starts from the DLCI_ASSIGNED state.
-
- 3.2.2 Command/response bit
-
- The C/R bit (bit 2 of octet 1) is set to 0.
-
- 3.2.3 Frame types
-
- The following two frame types are allowed in PVP.
-
- 3.2.3.1 Unnumbered information frames
-
- When a layer 3 or management entity requests unacknowledged infor-
- mation transfer, the unnumbered information (UI) command is used to send
- information to its peer without affecting data link layer variables. UI com-
- mand frames do not carry a sequence number and therefore, the UI frame
- may be lost without notification.
-
- The control field for the UI command frame is a single octet in length.
- The format and encoding are the same as specified in
- RecommendationQ.921/I.441. The UI frame is used to transport channel
- associated signalling.
-
- 3.2.3.2 Unnumbered information with header check frame
-
- The unnumbered information with header check (UIH) frame has the
- same applications as the UI frame. The difference between the two is that
- the cyclic redundancy check (CRC) sequence is derived over the frame and
- packet headers (the first 8 octets excluding flags) rather than over the entire
- frame. The check sequence fills the last two octets of the UIH frame.
-
- The control field of the UIH is a single octet in length and is shown in
- Figure 1/G.764.
-
-
-
- The UIH frame is used to transport voice (see Note).
-
- Note û The CRC check of the UIH protects 8 octets which contain the
- address field (to ensure correct delivery), the control field (to guarantee the
- validity of the frame type) and the layer3 header. It does not protect the
- voice information because voice traffic is more sensitive to delay due to
- retransmission than to bit errors and because this allows reduction of the
- voice information by block dropping under congestion without recalculating
- the CRC check. As a consequence, the test for invalid frames in º3.2.7 uses
- the minimum frame length of 10octets.
-
- 3.2.4 Poll bit
-
- The poll bit (P) is bit 5 of the UI/UIH frame control field. The P bit
- shall be set to 0.
-
- 3.2.5 Check sequence
-
- The check sequence (CS) algorithm is the same as that described in
- ISO Recommendation ISO-3309. The CS field shall be a 16-bit sequence. It
- shall be the ones complement of the sum (modulo 2) of:
-
- 1) The remainder of (x raised to k power) (x15 + x14 + x13 + x12 +
- x11 + x10 + x9 + x8 + x7 + x6 + x5 + x4 + x3 + x2 + x1 + 1)
- divided (modulo 2) by the generator polynomial x16 + x12 + x5 +
- 1, where k is the number of bits in the frame existing between, but
- not including, the final bit of the opening flag and the first bit of
- the first octet of the non-droppable octets for the header check
- sequence (HCS) or the first bit of the check sequence for the frame
- check sequence (FCS), excluding bits inserted for transparency,
- and
-
- 2) the remainder of the division (modulo 2) by the generator polyno-
- mial x16 + x12 + x5 + 1, of the product of x16 by the content of
- the frame existing between, but not including, the final bit of the
- opening flag and the first bit of the first octet of the non-droppable
- octets for the HCS or the first bit of the CS for the FCS, excluding
- bits inserted for transparency.
-
- As a typical implementation at the transmitter, the initial content of the reg-
- ister of the device computing the remainder of the division is preset to all
- ones and is then modified by division by the generator polynomial (as
- described above) of the address, control and appropriate portion of the infor-
- mation fields; the ones complement of the resulting remainder is transmitted
- as the 16-bit CS.
-
- As a typical implementation at the receiver, the initial content of the register
- of the device computing the remainder is preset to all ones. The final
- remainder after multiplication by x16 and then division (modulo 2) by the
- generator polynomial x16 + x12 + x5 + 1 of the serial incoming protected
- bits and the CS, will be 0001110100001111 (x15 through x0, respectively)
- in the absence of transmission errors.
-
- 3.2.6 Frame abort
-
- Receipt of seven or more contiguous 1 bits shall be interpreted as a
- frame abort, and the link layer entity shall ignore the frame currently being
- received. A frame following an abort must begin with an opening flag.
-
- 3.2.7 Invalid UI/UIH frames for PVP
-
- For the purposes of PVP, an invalid UI/UIH frame is a frame which:
-
- 1) is not properly bounded by two flags; or
-
- 2) has fewer than 10 octets between flags; or
-
- 3) has greater than 490 octets between flags; or
-
- 4) does not consist of an integral number of octets prior to zero bit
- insertion or following zero bit extractions; or
-
- 5) contains a FCS error.
-
- Invalid frames shall be discarded without notification to the sender. No
- action is taken as the result of that frame.
-
- 3.3 Packet layer
-
- The packet layer procedures apply to the information transfer phase
- only. Call control procedures are outside the scope of this Recommendation.
-
- 3.3.1 Voice packet format
-
- The format of voice packets is shown in Figure 2/G.764 within the
- UIH voice frame.
-
- Note û The reserved bits are set to 0 at the originating endpoint. They
- shall be ignored at the terminating endpoint. They shall not be used for test-
- ing or maintenance purposes in anticipation of possible future uses.
-
-
-
- 3.3.1.1 Protocol discriminator
-
- The protocol discriminator (PD) field is the first octet of the packet
- header (octet 4, the frame in Figure2/G.764). Its value for the PVP is given
- in Figure 3/G.764.
-
-
-
- 3.3.1.2 Block dropping indicator
-
- The block dropping indicator (BDI) tracks the status of block drop-
- ping within the voice packet. A block consists of bits of the same signifi-
- cance collected from all speech samples that are packetized. The size of the
- block is 128bits, which, for a sampling rate of 8kHz, corresponds to a
- packetization interval of 16ms. Blocks are arranged in decreasing order of
- significance.
-
- The format of the BDI is shown in Figure 4/G.764.
-
-
-
- The combination C1 and C2 form the C-subfield that indicates the
- number of blocks that are still droppable at any intermediate node in the net-
- work, as shown in Table1/G.764:
-
-
-
- As blocks are dropped from the packet, the value in the C-subfield is
- decremented to reflect the number of blocks still available for dropping.
-
- The combination M1 and M2 forms the M-subfield that indicates the
- total number of blocks that can be discarded from the packet as it traverses
- the network during periods of network congestion, as shown in Table 2/
- G.764. The value in the M-subfield is not changed from its initial value.
-
-
-
- For fixed rate coding, both the M-subfield and the C-subfield are set
- to 0.
-
- 3.3.1.3 Time stamp
-
- The TS records the cumulative variable queueing delays experienced
- by a packet in traversing the network with a resolution of 1 ms. To prevent
- wrap-around, the maximum valid value in the TS field shall not exceed
- 200ms. If, after update, the variable delay exceeds 20 ms, the value is set
- to 20 ms.
-
- 3.3.1.4 Coding type
-
- The coding type (CT) field indicates the method of coding the speech
- samples at the originating endpoint before packetization. Figure 5/G.764
- shows the valid encodings for the field.
-
- When the coding type for voice-band signals is fixed or embedded adaptive
- differential pulse-code modulation (ADPCM), the polarity of ADPCM sam-
- ples complies with RecommendationsG.726/G.7271). When the coding
- type for voice-band signals is 8-bit pulse code modulation (PCM), the polar-
- ity of PCM samples complies with RecommendationG.711.
-
- 3.3.1.5 M-bit
-
- The M-bit is set to 1 for all packets except for the last packet of a
- burst where it is set to 0. The M-bit may be used by the terminating end
- point to recover from packet loss.
-
- 3.3.1.6 Sequence number
-
- The sequence number (SEQ) is used by endpoints in the build-out
- process to:
-
- 1) determine the first packet of a burst; and
-
- 2) determine if a packet has been lost.
-
- The SEQ, in conjunction with the TS, allows the removal of variabil-
- ity in network delay.
-
- SEQ 0 is placed in the first packet of a voice burst. Subsequent packets in
- the same burst are given numbers 1 to 15, rolling back to 1.
-
- 3.3.1.7 Noise field
-
- The noise field indicates a background noise level as shown in Figure
- 6/G.764. The receiving end uses this field to determine the level of the back-
- ground noise that may be played in the absence of packets.
-
-
-
-
-
- 3.3.1.8 Voice information field
-
- The voice information field contains blocks arranged according to the
- significance of the bits. The first block contains the MSBs of all samples,
- the second contains the second MSBs and so on. Within a block, bits are
- ordered according to their corresponding sample numbers.
-
- Figure 7/G.764 shows the bit nomenclature convention before pack-
- etization and the information field format after packetization. Figure8/
- G.764 depicts the format of the entire voice packet where the voice is coded
- using an embedded (5,2) ADPCM algorithm. Here, up to 3blocks can be
- dropped. Note the most significant bit for PCM is the sign bit.
-
- 3.3.2 Signalling packet format
-
- The format of the channel associated signalling packets is shown in
- Figure 9/G.764 within a UI signalling frame format. See º3.3.1 regarding
- the setting of the reserved bits.
-
- 3.3.2.1 Protocol discriminator
-
- The format and encoding of the PD field are the same as in the voice
- packet format (see º 3.3.1.1).
-
- 3.3.2.2 Block dropping indicator
-
- The format of the BDI field is the same as in the voice packet format
- (see º 3.3.1.2). Both the C-subfield and the M-subfield are set to 0.
-
-
-
-
-
-
-
- 3.3.2.3 Time stamp
-
- The format of the TS field is the same as in the voice packet format
- (see º 3.3.1.3).
-
- 3.3.2.4 Normal/alarm state bit
-
- The normal/alarm (N/A) bit is used to transfer information on alarm
- status across a virtual circuit in the direction of transmission from the full
- rate access side to the packet side. The N/A bit set to 0 indicates normal
- operation. The N/A bit set to 1 indicates the existence of an alarm on the full
- rate access facility or error condition on the virtual circuit.
-
- 3.3.2.5 M-bit
-
- The M-bit shall be set to 0 in all signalling packets.
-
- 3.3.2.6 Sequence number
-
- The SEQ for signalling packets is always set to 0.
-
- 3.3.2.7 ABCD signalling bits
-
- The originating endpoint uses the ABCD signalling bits to indicate to
- the terminating endpoint on the far side the current signalling state of the
- full rate access channel in the direction of transmission. The value of the
- Abit alone is meaningful in two-state signalling systems. The value of the
- Aand B bits alone are meaningful in four-state signalling systems. The val-
- ues of all ABCD bits are meaningful in 16-state signalling systems. The val-
- ues of the ABCD bits have no significance when there is no channel
- associated signalling.
-
- The number of signalling states must be the same for both the origi-
- nating and terminating endpoints on a virtual circuit basis. The values coded
- in this field depend on the framing type and the number of signalling states.
-
- 4 Link layer procedures
-
- 4.1 Addressing
-
- Voice and signalling transport packets are transmitted on different
- layer 2 addresses.
-
- 4.2 Endpoint procedures
-
- These procedures apply for UI and UIH frames.
-
- 4.2.1 Transmitting UI frames
-
- Information received by the link layer entity from layer 3 by means of
- a DL-UNIT-DATA request shall be transmitted as unnumbered information
- with a FCS. The P bit shall be set to 0. The list of all primitives used in the
- procedures is given in º9.
-
- 4.2.2 Transmitting UIH frames
-
- Information received by the link layer entity from layer 3 by means of
- a DL-UNIT-H-DATA request shall be transmitted as unnumbered informa-
- tion with an HCS. The P bit shall be set to 0.
-
- 4.2.3 Receiving UI frames
-
- When a link layer entity is not in a receiver busy condition and
- receives a valid UI frame, the link layer entity shall pass the information
- field of this frame to layer 3 using the primitive DL-UNIT-DATA indication.
-
- 4.2.4 Receiving UIH frames
-
- When a link layer entity is not in a receiver busy condition and
- receives a valid UIH frame, the link layer entity shall pass the information
- field of this frame to layer 3 using the primitive DL-UNIT-H-DATA indica-
- tion.
-
- 4.3 Intermediate node procedures
-
- 4.3.1 Transmitting a frame
-
- Whenever a frame is received from the link layer entity receive proce-
- dure, the frame shall be transmitted with the same frame type, including the
- P bit value, and the C/R bit value as in the received frame.
-
- 4.3.2 Receiving a frame
-
- Detected invalid frames (e.g. failed FCS or HCS, unassigned DLCI)
- shall be discarded with no indication passed to layer 3. The control field of
- the frame shall be examined. Upon recognition of UI or UIH frame types,
- the frame is passed to layer 3 with the DL-PVP-DATA indication primitive
- for UI frames and DL-PVP-H-DATA indication primitive for UIH frames.
-
- The Address and CS are the only fields modified during the link layer
- procedure.
-
- 5 Voice transport procedures
-
- Voice transport procedures are divided into originating, intermediate
- and terminating node (endpoint) procedures. Originating endpoints are
- nodes where user data are formulated into PVP packets for transport. Inter-
- mediate nodes are nodes that do not alter the packet format, but simply
- receive and transport PVP packets. Terminating endpoints are the destina-
- tion nodes for PVP packets. It is assumed that the processing of primitives
- requires a fixed amount of time. Any time variance in the processing of
- primitives shall be accounted for in the value of the timer TVDELAY_V.
-
- Figure 10/G.764 shows a functional viewpoint of an endpoint node,
- which shows that it consists of an originating endpoint and a terminating
- endpoint.
-
- FIGURE 10/G.764 (8.5 cm)
-
-
-
- 5.1 Originating endpoint procedures
-
- The originating endpoint receives segmented data from a higher layer
- entity via the primitives PL-START request(CODE, NOISE), PL-DATA
- request(CODE, NOISE) and PL-STOP request(CODE, NOISE). These
- primitives include information on the type of encoding and noise level asso-
- ciated with the packet.
-
- 5.1.1 Receipt of PL-START request primitive
-
- The higher level entity will send to the layer 3 entity, the PL-START
- request(CODE, NOISE) primitive after it has collected all the samples of
- the first packet. When the originating endpoint receives the PL-START
- request(CODE, NOISE) primitive, the layer 3 entity shall start the timer
- TVDELAY_V associated with the first packet and shall form a voice packet
- with M-bit set to 1 and SEQ set to 0. The BDI, CT and Noise fields are
- encoded based on the coding type and noise level indicated in the primitive
- PL-START request(CODE, NOISE).
-
- The layer 3 entity sets the send sequence state variable (SSEQ) to 1
- and checks its own congestion level indicator (CLI) to determine whether
- blocks should be dropped from the packet and the number of blocks to be
- dropped. If the CLI is greater than 0, then the block dropping procedures of
- º5.4 shall be followed. If the CLI is 0, then the block dropping procedures
- are omitted. The CLI is a local parameter of the node.
-
- The layer 3 entity shall buffer the packet until notified by the layer2
- entity that layer 1 is ready to transport data. In the absence of facility alarms,
- this notification shall be conveyed by the primitive DL-L1-READY indica-
- tion. Upon receipt of the primitive, the timer TVDELAY_V is stopped and
- its value shall be copied to the TS field. The value of the TS field shall not
- exceed 200.
-
- The packet is then delivered to the layer 2 entity with the primitive
- DL-UNIT-H-DATA request.
-
- 5.1.2 Receipt of the PL-DATA request primitive
-
- After receiving the PL-DATA request(CODE, NOISE) primitive from
- a higher layer entity, the PVP layer 3 entity shall start the timer TVDE-
- LAY_V and form a voice packet with the M-bit set to 1 and the SEQ set to
- the value of the SSEQ. The BDI, CT and noise fields are encoded on the
- basis of the corresponding information in the PL-DATA request primitive.
- The layer 3 entity increments the SSEQ (value from 1 to 15 with a roll over
- to 1). It shall check the CLI to determine the need for block dropping. If the
- CLI is greater than 0, then the block dropping procedure of 5.4 shall be fol-
- lowed. If the CLI is 0, then the block dropping procedure shall be omitted.
-
- The layer 3 entity shall await the arrival of the DL-L1-READY indi-
- cation primitive from layer 2. Upon receipt of the primitive, the timer
- TVDELAY_V is stopped and its value shall be copied to the TS field. The
- layer 3 entity shall pass the voice packet to the layer 2 entity for transport
- using the DL-UNIT-H-DATA request primitive.
-
- 5.1.3 Receipt of the PL-STOP request primitive
-
- When a higher layer entity detects a gap in the speech, it will continue
- the packetization until all 128 samples have been packetized. It will then
- send the PL-STOP request primitive to the layer 3 entity. The layer 3 entity
- shall follow the procedures outlined above following receipt of the PL-
- DATA request except that it shall set the M-bit to 0.
-
- 5.1.4 Number of blocks and packetization interval
-
- The packetization interval is 16 ms. The number of blocks of 128 bits
- collected during this interval depends on the coding type, as shown in
- Table3/G.764.
-
-
-
- 5.1.5 Coder reset
-
- When the coding type represents that of Recommendations G.722,
- G.726 or G.727, a voice packet at the beginning of a speech burst (i.e. with
- SEQ = 0) must start with a reset coder.
-
- Interoperability issues with PCM coding is an issue for further study.
-
- 5.2 Intermediate node procedures
-
- Upon receipt of the DL-PVP-H-DATA indication primitive, the layer
- 3 entity will start timer TVDELAY V associated with that packet. The layer
- 3 entity shall examine the value encoded in the PD field. If this value
- matches that for PVP, the layer 3 entity shall examine the CLI which is a
- system variable. The CLI shall be set by the management entity to indicate
- the number of blocks to be dropped from packets containing droppable
- blocks (0, 1, 2 or 3 blocks may be specified).
-
- If the CLI is greater than 0, then blocks may be dropped from the
- packet according to the block dropping procedures described below. If the
- CLI is 0, then no block dropping shall occur.
-
- The packet shall then be buffered until the layer 3 entity receives the
- primitive DL-L1-READY indication from layer 2. Upon receipt of this
- primitive, the variable delay timer TVDELAY_V shall be stopped and its
- value shall be used to update the packet's time stamp. The resolution of
- TVDELAY_V is 1 ms. The value of the TS field shall not exceed 200ms.
-
- The layer 3 entity shall then pass the information to the layer 2 entity
- via the DL-PVP-H-DATA request primitive.
-
- 5.3 Terminating endpoint procedures
-
- Upon receipt of the DL-UNIT-H-DATA indication primitive, the layer
- 3 entity shall examine the value encoded in the PD field. If this value
- matches that for PVP, the layer 3 entity will proceed as below.
-
- 5.3.1 Illegal BDI/coding type combinations
-
- The packet is dropped if the combination of the CT field and the BDI
- is illegal. The state variable RSEQ is not updated.
-
- Illegal combinations are those where the C-subfield value and/or the
- M-subfield value of the BDI field exceed the number of droppable bits spec-
- ified by the coding type. Valid combinations are defined in Table4/G.764.
-
-
-
- 5.3.2 Wrong packet length
-
- A voice packet shall be dropped if its length is not consistent with the
- BDI and CT fields. The state variable RSEQ shall not be updated. The fol-
- lowing equation gives the valid packet length based on the BDI subfield val-
- ues and the CT:
-
-
-
- where
-
- l is the packet length in octets
-
- S is the number of bits per sample (from coding type)
-
- M is the value of M-subfield (from BDI)
-
- C is the value of C-subfield (from BDI)
-
- R is the sampling rate (8000 samples/sec)
-
- T is the sampling period (16 ms)
-
- 5.3.3 Play-out procedures
-
- 5.3.3.1 Decoder reset
-
- When the coding type represents that of G.722, G.726 or G.727, a
- voice packet at the beginning of a speech burst (i.e.with SEQ=0) must
- cause the decoder to reset. This is done by sending to the management entity
- the primitive MPL-DECODER-RESET request.
-
- Interoperability issues with PCM coding is an issue for further study.
-
- 5.3.3.2 Build-out delay procedures
-
- The build-out delay is a system variable that defines at each end the
- maximum allowable variable delay in the transmission path. The purpose is
- to mask the variability in the delay that each packet may experience so that
- all packets are played at regular intervals thereby achieving packet voice
- synchronization. This value shall be always <199ms. Packets that experi-
- ence delays beyond the build-out value are discarded. The policy of packet
- replacement is left for further study.
-
- Packets that are played out based on the TS value are:
-
- 1) packets with SEQ = 0, i.e. the first packet in a voice burst and all
- signalling packets;
-
- 2) the voice packet that follows a missing packet, i.e. SEQ in the
- received packet is different from receive sequence state variable
- (RSEQ).
-
- When the time for playing out a packet is based on the TS, the duration it is
- held before play-out is given by:
-
- (Build-out delay)û(TS value) = (ms to hold packet before play-out).
-
- The packet shall be played out at the end of this period.
-
- Packets with non-zero sequence numbers that are received in sequence are
- played out without a gap after the preceding packet.
-
- The state variable RSEQ is updated after a voice packet has been scheduled
- for play-out.
-
- 5.3.3.3 Embedded ADPCM
-
- For embedded ADPCM, the receiving end determines the algorithm
- to use for decoding the speech through the BDI and CT fields.
-
- 5.3.3.4 Absence of packets
-
- In the absence of packets to be played, the M-bit of the previous
- packet can be used to determine whether an interpolation procedure is nec-
- essary.
-
- The M_LAST system variable stores the value of the M-bit in the last
- packet.
-
- If M_LAST = 0, the gap is legitimate and the terminating endpoint
- shall play out the background noise level that corresponds to the value
- encoded in the noise field of the last received voice packet, as given in the
- table of Figure6/G.764. If M_LAST = 1, then a packet was lost. Recom-
- mended interpolation procedures, e.g. noise fill or last packet replay, are left
- for further study.
-
- 5.4 Block dropping procedures
-
- Embedded coding algorithms allow for droppable and non-droppable
- bits within the packet. Dropping the first droppable bit of each sample corre-
- sponds to dropping the last block in the packet.
-
- When the CLI specifies the dropping of 1 or more blocks, the layer 3
- entity shall determine from the C-subfield (in the BDI field) of a packet the
- number of droppable blocks available for dropping. The number of blocks
- that can be still dropped is given by:
-
- min(value in C-subfield, value in CLI)
-
- The C-subfield of the BDI shall be updated to indicate the number of
- blocks that can be dropped at the following nodes. This number can be set to
- 0 if no blocks can be dropped at the following nodes.
-
- 6 Signalling transport procedures
-
- 6.1 General principles
-
- Channel associated signalling is transported across the packet net-
- work using signalling packets. To minimize the incorrect delivery of signal-
- ling information, channel associated signalling is transported in a UI frame
- with a different logical address than that of the corresponding UIH frame
- that transports the voice information.
-
- There are two types of signalling packets: signalling transition pack-
- ets and refresh packets. Both have the same structure shown in Figure9/
- G.764 and are enclosed in UI frames. The originating end sends a signalling
- transition packet whenever the signalling state changes. It sends refresh
- packets on a periodic basis to indicate that the link is still active.
-
- The endpoints will generate and receive signalling packets for each
- virtual circuit provisioned for channel associated signalling. To account for
- a variety of signalling schemes, the endpoints shall provide for the follow-
- ing variations:
-
- 1) No signalling packets.
-
- 2) Signalling refresh packets only.
-
- 3) Signalling refresh packets and signalling transition packets for 2-
- state signalling using the A bit. Changes in the A bit result in tran-
- sition packets while other bits are ignored.
-
- 4) Four-state signalling using the A and B bits so that signalling
- refresh packets and signalling transition packets for changes in the
- A and B bits result in transition packets while other bits are
- ignored.
-
- 5) Signalling refresh packets and signalling transition packets for 16-
- state signalling using the A, B, C, and D bits so that transitions in
- any of the four signalling bits trigger transition packets.
-
- The number of signalling states must be the same for both the originating
- and terminating endpoints on a virtual circuit basis. The values coded in this
- field depend on the framing type and the number of signalling states.
-
- It is assumed that the processing of primitives requires a fixed amount of
- time. Any time variance in the processing of primitives shall be accounted
- for in the value of the timer TVDELAY_SIG.
-
- 6.2 Originating endpoint procedures
-
- The management entity of the originating endpoint shall perform the
- following procedures for each virtual circuit provisioned to support channel
- associated signalling:
-
- 1) Determine, once per extended superframe, the current state of the
- ABCD bits and determine whether a transition has occurred in
- accordance with the number of signalling states supported.
-
- 2) When a transition occurs, the management entity shall send MPL-
- SIG-PKT request (A,B,C,D,N/A) primitive to the originating end
- of the PVP entity. This originating endpoint must then transmit a
- transition signalling packet containing the current signalling and
- alarm states.
-
- The originating endpoint starts in the NORM state. In this state, signalling
- packets (refresh packets) with the current signalling and alarm states as indi-
- cated by the N/A bit must be sent at least every TSIG_REF s. The default
- value for the refresh timer, TSIG_REF, is 10seconds.
-
- The N/A bit is set to 0 as long as there are no facility alarms (out-of-frame,
- red or yellow alarms) and that TSIG_KA timer has not expired. The N/A bit
- shall be set to 1 if there is a facility alarm or if the TSIG_KA timer of the
- associated terminating end has expired (i.e. the terminating end is in state
- L_ALARM). Upon the occurrence of a facility alarm, the originating end of
- the PVP entity shall move from the NORM state to the ALARM state and
- shall stop transmitting transition packets. It shall continue to send refresh
- packets every TSIG_REF seconds with the N/A bit set to 1.
-
- The signalling state is frozen until the alarm condition is terminated and the
- originating endpoint moves back to the NORM state. In the NORM state,
- the originating endpoint sends packets with the N/A bit set to 0 after the
- associated terminating endpoint has received a signalling packet.
-
- 6.3 Intermediate node signalling procedures
-
- Upon receipt of the DL-PVP-DATA indication primitive, the layer 3
- entity will start timer TVDELAY_SIG associated with that packet. The
- layer 3 entity shall examine the value encoded in the PD field. If this value
- matches that for PVP, the layer 3 entity shall buffer the packet until it
- receives the primitive DL-L1-READY indication from layer 2. Upon receipt
- of this primitive, the variable delay timer TVDELAY_SIG shall be stopped
- and its value shall be used to update the packet's time stamp. The resolution
- of TVDELAY_SIG is 1ms. The value of the TS field shall not exceed
- 200ms.
-
- The layer 3 entity shall then pass the signalling information to the
- layer 2 entity via the DL-PVP-DATA request primitive.
-
- 6.4 Terminating endpoint procedures
-
- The terminating endpoint shall perform the following procedures for
- each 64 kbit/s stream provisioned for channel associated signalling:
-
- 1) In the NORM state: Upon receipt of a signalling packet, the termi-
- nating endpoint shall build out the packet according to the time
- stamp and reinsert the ABCDbits into the PCM bit stream. The
- build-out procedure is the same as for voice packets (see º6.3.3.2)
- except that at play-out time, the layer 3 entity informs the Manage-
- ment Entity of the signalling packet with the primitive MPL-SIG-
- PKT indication (A,B,C,D,N/A). The terminating endpoint shall
- continue to use the most recent signalling bits until another signal-
- ling packet is received.
-
- 2) If no signalling packet is received for a time TSIG_KA (i.e.
- TSIG_KA has expired), the terminating endpoint shall move to the
- L_ALARM state and shall initiate trunk conditioning towards the
- full rate access side. The default value for TSIG_KA is 25 seconds.
- Upon receipt of a signalling packet with the N/A bit set to0, the
- terminating end of the PVP entity shall move to the NORM state
- and shall terminate the trunk conditioning.
-
- 3) In the NORM state: Upon receipt of a signalling packet with the N/
- A bit set to 1, the terminating end of the PVP entity shall move to
- the R_ALARM state and shall initiate trunk conditioning towards
- the full rate access side. It shall return to the NORM state and ter-
- minate the trunk conditioning when it receives a signalling packet
- with the N/A bit set to 0.
-
- 4) If the TSIG_KA expires in the R_ALARM state, the terminating
- end shall move to the L_ALARM state.
-
- 5) If a signalling packet arrives with N/A = 1 in the L_ALARM state,
- the terminating end shall move to the R_ALARM state.
-
- 6.5 Signalling states
-
- 6.5.1 Originating end signalling states
-
- The originating end has two signalling states, as follows:
-
- 6.5.1.1 Normal state
-
- In this state there are no access facility alarms on the full rate access
- side.
-
- 6.5.1.2 Alarm state
-
- This is the state when there is a facility alarm on the full rate access
- side.
-
- 6.5.2 Terminating end signalling states
-
- The terminating endpoint has three signalling states:
-
- 6.5.2.1 Normal state (NORM)
-
- The terminating endpoint remains in this state as long as signalling
- packets arrive with N/A bit set to 0 and TSIG_KA has not expired.
-
- 6.5.2.2 Loss of keep alive alarm (L_ALARM)
-
- The timer TSIG_KA has expired without the reception of a signalling
- packet. This indicates that a failure has occurred with the packet portion of
- the connection and normal signalling packet transport has been interrupted.
-
- 6.5.2.3 Remote alarm (R_ALARM)
-
- Receipt of signalling packet with N/A bit set to 1 indicates that the far
- end is experiencing an alarm condition.
-
- 7 System variables
-
- 7.1 Send sequence state variable
-
- Each transmitting endpoint shall have an associated SSEQ that stores
- the value of the SEQ of the next packet to be transmitted. SSEQ can take on
- the value of 0 through 15 and is incremented by 1 after each successful
- packet transmission. When SSEQ has the value 15 and another packet of the
- same voice burst is transmitted, the value of SSEQ is updated to 1.
-
- 7.2 Receive sequence state variable
-
- Each terminating endpoint shall have an associated RSEQ that stores
- the sequence number of the next in-sequence voice packet expected to
- arrive. RSEQ can take on the value of 0 through 15 and is incremented by 1
- (with roll-over to 1) after the voice packet is scheduled for play-out. RSEQ
- takes on the value 0 only when the last packet of a voice burst has been
- scheduled for play-out.
-
- 7.3 M_LAST variable
-
- M_LAST stores the value of the M-bit in the last packet.
-
- 7.4 Congestion level indicator (CLI) variable
-
- The CLI is set by the management entity to indicate the number of
- blocks to be dropped from packets containing droppable blocks (0, 1, 2, or 3
- blocks may be specified).
-
- 8 Protocol parameters
-
- 8.1 Build-out delay
-
- The value of the build-out delay shall be equal to the maximum
- allowable variable delay in the transmission path of voice-band traffic. This
- value shall be <199ms. The resolution of the build-out delay is 1ms.
-
- 8.2 TSIG_REF
-
- The interval between successive transmissions of refresh signalling
- packets from the originating end point of the node containing the PVP
- entity. It may take the values of 1, 5, 10 or 20s. The default value is 10s.
-
- 8.3 TSIG_KA
-
- This is the maximum time allowed without receiving a signalling
- packet at the terminating end of a node containing the PVP entity before it
- must take recovery actions. TSIG_KA is a multiple of TSIG_REF. The mul-
- tiplier may be set to 1.5, 2.5, 3.5 or 4.5. The default value of the multiplier is
- 2.5.
-
- 8.4 TVDELAY_V
-
- This timer is used to measure the variable queueing delay in a node
- that a voiceband packet encounters. It is used to update the TS field of a
- voice-band packet.
-
- 8.5 TVDELAY_SIG
-
- This timer is used to measure the variable queueing delay in a node
- that a signalling packet encounters.
-
- It is used to update the TS field of a signalling packet.
-
- 9 Summary of primitives
-
- 9.1 Primitives for the interface with layer 2
-
- The layer 2 primitives used for PVP are described below:
-
- 9.1.1 DL-L1-READY indication
-
- This primitive is used to indicate to layer 3 that layer 1 is ready for
- transmission.
-
- 9.1.2 DL-UNIT-DATA request
-
- The DL-UNIT-DATA request primitive is used by the layer 3 entity to
- request the transmission of layer 3 messages which are to be transmitted by
- the data link layer in UI frames using the unacknowledged information
- transfer service.
-
- 9.1.3 DL-UNIT-DATA indication
-
- The DL-UNIT-DATA indication primitive is used to indicate receipt
- by the data link layer of PVP at the terminating endpoint of layer 3 mes-
- sages that are enclosed UI frames.
-
- 9.1.4 DL-UNIT-H DATA request
-
- The DL-UNIT-H-DATA request primitive is used by the layer 3 entity
- to request the transmission of layer 3 messages which are to be transmitted
- by the data link layer in UIH frames using the unacknowledged information
- transfer service.
-
- 9.1.5 DL-UNIT-H-DATA indication
-
- The DL-UNIT-H-DATA indication primitive is used to indicate
- receipt by the data link layer of PVP at the terminating endpoint of layer 3
- messages that are enclosed in UIH frames.
-
- 9.1.6 DL-PVP-H-DATA indication
-
- The DL-PVP-H-DATA indication primitive is used to indicate receipt
- by the data link layer of PVP at intermediate nodes of layer 3 messages in
- UIH frames.
-
- 9.1.7 DL-PVP-DATA indication
-
- The DL-PVP-DATA indication primitive is used by the data link layer
- of PVP intermediate nodes to indicate receipt of layer 3 messages in UI
- frames.
-
- 9.1.8 DL-PVP-H-DATA request
-
- The DL-PVP-H-DATA request primitive is used by the layer 3 entity
- of an intermediate node to indicate to the data link layer a layer 3 message to
- be transported in a UIH frame.
-
- 9.1.9 DL-PVP-DATA request
-
- The DL-PVP-DATA request primitive is used by the layer 3 entity of
- an intermediate node to indicate to the data link layer a layer 3 message to
- be transported in a UI frame.
-
- 9.2 Primitives for the interface with upper layers
-
- 9.2.1 PL-START request(CODE, NOISE)
-
- The PL-START request(CODE, NOISE) primitive is used by the
- higher layer of the originating endpoint to request that the layer 3 entity
- begin formatting voice packets with the CT = CODE and the Noise =
- NOISE.
-
- 9.2.2 PL-DATA request(CODE, NOISE)
-
- The PL-DATA request(CODE, NOISE) primitive is used by the
- higher layer of the originating endpoint to continue the formatting voice
- packets with the CT=CODE and the Noise=NOISE.
-
- 9.2.3 PL-STOP request
-
- The PL-STOP request primitive is used by upper layers to indicate the
- end of a speech burst.
-
- 9.3 Primitives for the interface with the management entity
-
- 9.3.1 MPL-DECODER-RESET request
-
- The MPL-DECODER-RESET request primitive is used by layer 3 of
- the PVP originating endpoint to request resetting of the decoder by the man-
- agement entity.
-
- 9.3.2 MPL-SIG-PKT request(A,B,C,D,N/A)
-
- This primitive is used by the management entity to request transmis-
- sion of a transition signalling packet by the PVP layer3.
-
- 9.3.3 MPL-SIG-PKT indication(A,B,C,D,N/A)
-
- This primitive is used by the layer 3 entity to inform the management
- entity of the play-out of a signalling packet by the PVP layer3.
-