Access Millions of academic & study documents

Introduction to Silence Suppression

Content type
User Generated
Subject
Computer Science
Type
Study Guide
Showing Page:
1/3
Introducon to Silence Suppression
         

  
       
!
"
#       !   
           
    $     % 
&
!
 !    ! % 

Why is silence suppression used?
' (      $   
)!*+,!

!!-!
.
!
/
!
0#1 *  +     ! !  
!-$

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/3
#1*+2
/
What can be used instead of silence suppression?
3!
         !  

 !- 040#1
      
5
!
!
   !      
% -
          
6!
0#1 0  ! 

!
0#1
        
        
-0#1
RFCs discuss silence suppression.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/3

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
Introduction to Silence Suppression Silence suppression is a technique of saving bandwidth while conducting voice communications and at least audio-communications, on the Internet. This method is beneficial for businesses basically for the organizations that specialize in Internet voice application service providers. The technology needs asynchronous movement of the data that is a trouble-free task for Internet users to handle. Its outcome is a clear free flow communication among the two parties. As the conventional phone connections could not take benefit of the suppression technology and so this technology was developed together with the Internet voice communications. Internet shares an extensive variety of data, which affects the transmission speed due to great demand for data-transfer. It results in difficulties for voice communication to slow down the network of computers. This c ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4