WO2007147033A2 - Code-based echo cancellation - Google Patents
Code-based echo cancellation Download PDFInfo
- Publication number
- WO2007147033A2 WO2007147033A2 PCT/US2007/071180 US2007071180W WO2007147033A2 WO 2007147033 A2 WO2007147033 A2 WO 2007147033A2 US 2007071180 W US2007071180 W US 2007071180W WO 2007147033 A2 WO2007147033 A2 WO 2007147033A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- signal
- client
- code
- server
- convolved
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/029—Firewall traversal, e.g. tunnelling or, creating pinholes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M9/00—Arrangements for interconnection not involving centralised switching
- H04M9/08—Two-way loud-speaking telephone systems with means for conditioning the signal, e.g. for suppressing echoes for one or both directions of traffic
- H04M9/082—Two-way loud-speaking telephone systems with means for conditioning the signal, e.g. for suppressing echoes for one or both directions of traffic using echo cancellers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/062—Pre-authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
Definitions
- Conventional raobi Ie communication platforms include cellular Communications, for example. Global Systems for Mobile (GSM) Communications.
- GSM Global Systems for Mobile
- WiFi Wireless Fidelity
- Other conventional platforms that support limited mobility include WiFi, which is based on IEEE 802 1 1 standards.
- Cellular and WiFi are both well -known and established wireless communication platforms
- Next generation platforms may he designed to permit mobile users to move between cellular and WiFi networks and include an Unlicensed Mobile Access (UMA) standard that may provide a switch controller for carriers to permit users to transcend between cellular and WiFi networks and vice-versa
- UMA Unlicensed Mobile Access
- the UMA standard may have disadvantages including that carriers generally control calls and decide if and when to switch users between networks.
- An advanced mobile communication platform may be needed to provide enterprise level communication and control over users and the networks such that enterprises (instead of carriers) may select networks and/or control calls based on enterprise driven criteria rather than carrier driven criteria.
- echo cancellation (EC) technology has been widely used to improve quality of service (QoS) for end-users.
- EC echo cancellation
- LEC line or network echo canceller
- AEC acoustic echo canceller
- AEC is generally used to remove acoustic echoes caused by acoustic sound feedbacks from a speaker to a microphone on a hand-free speakerphone, mobile phone, or conference phone
- implementing an AEC may be more challenging due to some of the following factors: longer echo tail since the sound speed is much slower than the light (or electron) speed, and accordingly the echo canceller is required to have more processing power and more memory; more dynamic change of the acoustic echo characteristics because of movement of the phone or talker and changes in the environment, and accordingly the echo canceller may be required to track and catch up changes in the echo characteristics more quickly, and multiple echo paths due to multiple reflections from different objects with different distances and/or orientations.
- a typical AEC utilizes an adaptive filter to model one or more echo path transfer functions and try to produce a replica of the echoes. The AEC may then subtract this replica from the near-end input signal to form a supposedly final echo-free fax-end signal output.
- voice and/or video media contents may need to be transferred from the transmitter to the receiver in real-time, while the underlying IP network was originally designed for no ⁇ real-time date communications. Accordingly, providing and maintaining the quality of service (QoS) to the end-users may become a very challenging task
- QoS quality of service
- the packet delay, the packet delay variation (packet jitter) and the packet loss from end-to-end may be considered three important QoS parameters which affect the quality and performance of the voice and video communications over IP network, [001 1]
- Current jitter buffer technologies tend to have limitations.
- a jitter buffer scheme which may also be called de-jitter buffer scheme is usually employed on the receiver side to compensate or remove the network packet jitter.
- the scheme may not play out the packet as soon as the packet is received, instead, the scheme may queue up the incoming packets and play out the queued packets at even intervals.
- the packet queuing may represent inserting a delay before the play-out, happens.
- the inserted delay is usually called play-out delay.
- the first issue may pertain to how much the play-out de ⁇ ay needs to be inserted. There may be a tradeoff on the amount of the play-out delay. For a large delay, there may be less packet loss. On the other hand, for a small delay, there may be a better interactive experience.
- the first issue may have been acceptably resolved by the adaptive jitter buffer scheme.
- a receiver may estimate the network packet jitter based on the timestamp of the RTP header of the incoming packets and the receiver local time. The receiver may then insert the minima! delay just enough to compensate the network packet jitter.
- the second issue on the jitter buffer design may pertain to when to insert the play- out delay.
- the play-out delay can be inserted at the beginning of each talk spurt.
- each talk spurt may he played out at even intervals, but only the silence periods between talk spurts are expanded or compressed.
- the packets coming in the receiver may ideally have gaps between talk spurts such that a device may be implemented to identify the beginning of ⁇ he each talk spurt based on the tiraestamp and the sequence number on the RTF headers of the incoming packets.
- Hardware or software platform dependency may cause interoperability and/or configuration problems
- a light weight protocol over a communication protocol such as, for example.
- Session Initiation Protocol that can efficiently transport information between a server and a client and can work independently of hardware and software platforms, a control plane protocol in use between the server and the client, and an underlying transport layer or the medium over which the server and the client communicate There may he a need for a protocol that is fast enough to support critical real time control messages and is flexible enough for large- volume data transfer with minima! delay.
- protocols such as UlViA are generally complex and difficult to establish interoperability.
- the applications may include one or more of Presence/instant Messaging, Intranet web resources, CRM, Support database, etc If the clients for one or more the above applications on the mobile phones access the enterprise resources directly, enterprise firewalls may need to be opened for multiple protocols, and opening the enterprise firewalls may cause security problems
- the inv ention relates, in an embodiment, to an apparatus for canceling a signal.
- the apparatus includes an identification code (ID code) generator configured to generate an ID code
- the apparatus also includes an ID code injector configured to inject the ID code into at least one of the signal and a processed signal to produce a convolved signal The processed signal resulted from a processing of the signal
- the apparatus further includes an ID code detector configured to detect at least one of the convolved signal, a transformed signal, and a transformation of the convolved signal.
- the transformed signal resulted from the transformation of the convolved signal
- the apparatus yet also includes an arithmetic function configured to remove at least one of the convolved signal and the transformed signal.
- FIG. 1 depicts a system network according to one or more embodiments of the present invention.
- Tigs. 2A-C depict a mobility server according to one or more embodiments of the present invention.
- FIG 3 depicts a mobile equipment client according one or more embodiments of the present invention.
- Ftg. 4 depicts a block diagram of a codec based echo canceller in accordance with one or more embodiments of the present invention.
- Fig. 5 A depicts a voice jitter buffer scheme in accordance with one or more embodiments of the present invention
- Fig. 5B depicts a video jitter buffer scheme in accordance with one or more embodiments of the present invention.
- FIG. 6A depicts an overview of a DDP architecture in accordance with one or more embodiments of the present invention
- Fig. 6 B depicts a DDP message exchange in accordance with one or more embodiments of the present invention.
- Fig. 7A depicts a network architecture which includes two network interfaces per host and is fabricated in accordance with one or more embodiments of the present invention.
- Fig 7B depicts a network architecture in accordance with one or more embodiments of the present invention.
- Fig. 7C depicts a network architecture in accordance with one or more embodiments of the present invention.
- Fig. 7D depicts a network architecture in accordance with one or more embodiments of the present invention.
- FIG. 8A shows a block diagram of an example prior an communication device including a filter for echo cancellation.
- Fig. SB shows a flowchart of an example prior art method utilized, for example, in the example prior art communication device shown in Fig. 8A, for cancelling echoes.
- Fig 9A shows, in accordance with one or more embodiments of the present invention, a block diagram of a communication device (or system or arrangement) that may cancel echoes without relying on a filter.
- Fig. 0 B shows, in accordance with one or more embodiments of the present invention, a block diagram of an ID code generator employed in the communication device for system or arrangement) shown in Fig. 9A.
- Fig. 9C shows, in accordance with one or more embodiments of the present invention, a flowchart of a method for cancelling echoes, for example, in the communication device (or system or arrangement) shown in Fig. 9A.
- Fig 1OA shows a block diagram of a first example prior art packet voice communication system (first prior art arrangement) with an adaptive jitter buffer scheme.
- Fig. 1 OB shows a flowchart of a transmitter-side process of a prior art jitter buffer scheme utilized, for example, in the first prior art arrangement shown in the example of Fig. 1OA.
- Fig. 1OC shows a flowchart of a prior art delay calculation process.
- Fig. 1 OD shows a flowchart of a prior art packet play-out control process.
- Fig. 10E shows a schematic representation of received packet flow at a packet play- out control when a transmitter-side voice activity detector (VAD) is turned on.
- Fig. 1OF shows a schematic representation of received packet flow at the packet play -out control when the transmitter-side VAD is turned off.
- Fig. 1 1 A shows a block diagram of a receiver-side device of a second prior art packet voice communication system (second prior art arrangement), which includes adaptive buffer overflow control.
- Fig. 1 IB shows a flowchart of a silence detection process utilized, for example, in the receiver-side device shown in the example of Fig. 1 1 A.
- Fig 11C shows a flowchart of a buffer overflow control process utilized, for example- in the receiver-side device shown in the example of Fig 1 1 A
- Hg 12 ⁇ shows, in accordance with one or more embodiments of the present invention, a block diagram of a reeeh cr-side device of a packet voice communication system with adaptive jitter handling
- Fig 12B shows, in accordance with one or more embodiments of the present invention, a delay insertion control process utilized for adaptive jittei handling utilized, for example, in the receiver-side device shown in the example of Fig 12 A
- Fig 13 shows, in accordance with one or more embodiments of the present invention, a block diagram of a recei ⁇ er-side device of a packet video communication system with adaptive jitter handling
- Hg 14 show s a prior art example of a call flow for establishing a connection between an application client and an application server
- Fig 15 shows, in an embodiment of the im ention, a simple architectural diagram of the DDP invention
- Fig 16A shows, in an embodiment, an example of how data within a mobility architectural arrangement with DDP may flow between an application client located within a client device and an application server, which is managed b ⁇ an enterprise
- Ftg 16B shows, in an embodiment, a code example of an encapsulated SlP notify message
- Hg I " 7 shows, in an embodiment, an example of a call flow illustrating how a secure channel may be established betw een a client device and a mobility server
- registration may occur
- Fig 18 shows, in an embodiment, a simple call flow illustrating a situation in which a large file may have to be sent
- Fig 1 Q shows, in an embodiment of the im ention, a simple call flow illustrating a situation in which small control messages, such as those sent by control applications, may be sent
- J Fig 20 is a prioi ait example of an archUectuial a ⁇ angement in which each application on a handset is connected individually to a corresponding application server within an enterprise
- Fig 21 is a prior art flow chart illustrating the method for enabling an application client to communicate with an application &eivei in an IP Security VTN environment
- Fig. 22 shows, in an embodiment of the invention, a simple block diagram of a mobility architectural arrangement.
- Fig. 23 shows, in an embodiment of the invention, a block diagram illustrating the mobility architectural arrangement as a rich client
- FIG. 24 shows, in an embodiment of the invention, a simple How chart illustrating an example of a method for employing a mobility architectural arrangement.
- Fig. 25 shows, in an embodiment of the invention, a mobility architectural arrangement implemented as a thin client.
- the invention might also cover an article of manufacture that includes a computer readable medium on which computer-readable instructions for carrying out embodiments of the inventive technique axe stored
- the computer loadable medium ma> include, foi example, semiconductor, magnetic, opto-magnetic, optical or other forms of computer readable medium for storing computer readable code
- the invention ma> also cover appaiatus.es foi piaeticing embodiment of the invention
- Such apparatus may include circuits, dedicated and/or programmable, to carry out operations pertaining to embodiments of the invention Examples of such apparatus include a general purpose compute!
- a dedicated computing device when appropriatel ⁇ programmed and may include a combination of a computer/computing device and dcdieatcd/piogrammablc circuits adapted for the various operations pertaining to embodiments of the invention [0068 j A Architecture
- Fig I depicts a s ⁇ stera network 100 according to an embodiment of the invention
- Mobile equipment (MF) 102 is prov ided that communicates with the network in a number of possible ways MF.
- 102 can communicate with a cellular network 1 10 that includes a Base Transceiver Station (BTS) I l 2, a BTS Switching Center (BSC) i 14 and Mobile Switching Center (MSC) 1 16
- BTS Base Transceiver Station
- BSC BTS Switching Center
- MSC Mobile Switching Center
- the MSC is coupled to a Media Gateway 120 that is coupled to a public switched telephone network (PSTN) 122
- PSTN public switched telephone network
- PSTN public switched telephone network
- PSTN public switched telephone network
- PSTN public switched telephone network
- PSTN public switched telephone network
- PSTN public switched telephone network
- PBX 130 is coupled to the PSTN and serves an enterprise for purposes of making and receh inn calls, for example, via telephone I 36
- Mobility server 150 is
- Figs. 2A-C depict a mobility server according to an embodiment of the invention.
- Figs. 2A-C depict a mobility server according to an embodiment of the invention.
- DiVhas mobility solution there are three distinct communicating entities: DiVitas Client, DiVitas Server and external VoIP GW. And there are two distinct types of paths between these entities: SlP signaling path and Media path.
- DMM User/Device Manager/Mobility Controller
- the device and mobility Manager (hereby referred to as DMM) is a module that handles device configuration and status as well as the mobility aspects while there is an active call on a device.
- the following sections capture the functional and design specifications of the DMM along with the public interfaces that the DMM supports. [0075] Here is a summary of the roles and responsibilities of the DMM
- Control Plane/Call Control - CaIi control is the primary control plane module responsible for the following functions:
- Call control module resides on the DN media switch.
- the call control module interfaces with the SIP stack, and Asterisk, (or any other) PBX module to provide the above mentioned functionality.
- SlP stack is mainly used as protocol message decode/encode engine. SlP stack also performs basic protocol specific tasks, like standards based message parsing and validation, retransmissions, proprietary message validation etc. For most of the proxy and B2BIJ A tasks, SIP stack relies on CC for decision-making. Interactions between CC and Asterisk as well as CC and CCM are through standards based SIP messages.
- Proxy Agent/Configuration Manager acts as a configuration manager for ail the applications. Call control related information is downloaded by PA at the time of provisioning or after the disk DB is read following a system bring up. CC stores the data in RAM for local/faster access, CC also updates PA of any dynamic information (e.g. call going active or down), or on demand information (e.g SNMP GET)
- Resource manager provides logical map of the physical/network resources. These resources include GE port, DSP resources, sockets, U DP/TCP ports, etc. and may not include system resources like memory, buffer pool, timers, queues etc. The resources may not include sockets used for internal IPC communication. CC uses RM for resource CAC, resource reservation and commit. As part of the commit, RM talks to media switch to program hardware to enable media flow.
- MSA Media Switch Application
- the MSA software needs to support encoding /decoding of different speech codecs.
- the type of algorithm and channel can change during am time i.e., a design to support multichannel, multi-algorithm is needed.
- Each codec algorithm needs to be reentrant, and the program as well as data needs to be fully releasable.
- the following needs to taken into account' a. Since the DSP has limited on chip data memory not a! I data can be placed on -chip all the time in multi-channel, multi-algorithm application. This requires all data (context and tables) in each algorithm to be relocatable (between on /off chip memory) during context switching. This requires a need to find out the memory', stack size as well as
- M 1 PS requirement for each supported codec.
- a mechanism to exchange messaging between host and DSP process indicating channel number as well as codec type along with any other features.
- the channel configuration manager needs to open a channel on DSP indicating type of functionality required. Periodic message indicating the state of DSP needs to be implemented.
- the DSP processor allows the external host to access the DSP external memory.
- the DSP has 16K bytes of fust level program as well as data memory.
- the program as well as data memory share the second level memory of 256kbytes.
- the l&Mbytes of external memory (SDRAM) is available.
- SDRAM external memory
- the shared memory between the two processors stores the incoming as well as outgoing RTP data. Since the DSP needs to support N number of channels, this memory will contain N receive as well as transmit buffers of length 320 bytes each (for video these buffers need to be of 1500 bytes).
- Data structure for messaging between host and DSP as well as information needed on per call basis needs to be defined The following steps define the DSP functionality. a. At boot up once the software is downloaded to DSP (the DSP will indicate the same by writing a predetermined value at a fixed memory location to indicate to host that the software is downloaded). b. Upon successful download of software., the DSP will run an internal timer of
- the DSP is polling for channel state to change to process, which is set by the host once the packet arrives, c
- a start call or open channel command from the host indicating codec type, data- ready as well as call type (initially only voice) is sent for RX as well as TX direction.
- the DSP picks up the RTP data from the external buffers and performs the DSP related functionality on those, e
- the DSP places encoded data on the externa! buffers to be picked up by the TX agent,
- FIG. 3 depicts a mobile equipment client according to an embodiment of the invention
- the client software or handset software runs on the handsets that are compatible v ⁇ th the Divitas Server. Typically these are dual-mode handsets that the capability to provide telephony connection on the cellular network (CDlViA or GSM) as well as IP connection on the LAN network (wired LAN or wireless LAN).
- CDlViA or GSM cellular network
- IP connection on the LAN network wireless LAN or wireless LAN.
- the software can be also be compiled for a desktops/laptops or a PDAs which have a microphone and a speaker to function as a softphone.
- User interface [0085] The client user-interface provides the following functionality
- Disable/inhibit client software - ISP application is used to make/receive cellular calls CaI S -control and voice
- Voice Engine for making VoIP calls on LAN interface - includes codecs., echo- cancellation, jitter control, error concealment
- the software may need to be designed in such a way that most of the code is shared across handsets Therefore, the code has to be divided into platform dependent part and platform independent part Most, in fact ail of the ⁇ ivitas core value should be in platform independent part of the software, which should be easily portable from one platform to another.
- the platform dependent part should be only the functional adaptation layers (particularly Telephony, LAN, 802 1 !, Audio and Display adaptation layers). Whenever the code is ported to a new platform, only these adaptation layers need to be modified or rewritten, while providing a uniform API to the platform independent pan.
- the client software will run on multiple handset platforms.
- the most prevalent handset platforms are Windows CE, Synibian and Linux.
- the client application is designed to work on
- the client application looks for the available resources on ⁇ he handset.
- the client application first checks for presence of wired network. If not present, then the client application checks for the presence of an 802 ⁇ 1 network.
- the wired or wireless medium authentication is done depending on the enterprise security policy.
- the handset client shall support the security mechanism employed in the enterprise The most common security mechanism is WPA (WiFi Protected Access) Once the authentication is done successfully, the wireless client gets the IP address for the IP interface using DHCP.
- the application gets the Divitas server URL and DNS JP addresses from persistent database and tries to register with a Divitas server.
- the client application could be running on a handset, which Is inside the enterprise network. In that case, the client can reach the Divitas server without any other security blankets. In case the client is in a public network, say a coffee shop or an airport with WiFi internet access, typically the user sets up a VPN connection to the enterprise. The client can reach the Divitas server only after the ⁇ ' PN tunnel is setup.
- the client application software authenticates the handset with the server by sending an encrypted certificate (installed by Enterprise IT) to the server.
- the diem gets the login/password from the user or stored in the handset, encrypts the login/password and sends the encrypted login/password to the .server for user authentication
- the server replies by sending the enterprise phone number
- the client sends the cellular phone number to the server.
- the server binds the two for all future handoff scenarios.
- the user can choose to be INVISIBLE or AVAILABLE at startup by configuring on the GUI and saving that configuration in the persistent database
- the client updates the user ' s presence information to the server
- the user can also enter frequently called buddies within the enterprise and save that configuration in the peisistent database on the handset
- the client gets the presence information (in bulk) of these buddies whether the) aie INVISIBLE, AVAILABLE or CALL- IN -PROGRESS
- the server updates the presence information of these buddies to the clients as and when the event occurs
- the client sends the network status to the server periodical! ⁇ - If the client is on an 802 ! 1 wireless network, the client sends the SSlD. si goal -strength and bandwidth of the associated access point CAP ⁇ to the s ⁇ rs ⁇ i (f there is a call in progress, the client sends the SSiD as part of ⁇ n-band RTCP packets If there is no call in progress, the client sends out-of- band keepalh e messages
- the preferred mode of making and reeek ing calls to the client is on the network interface
- the user can choose to override the preferred mode and make the outgoing calls on the cellular network
- This selection is not communicated to the server and may not affect the incoming calls
- This selection is also not stored in persistent database The user has to expiicith make the selection even.' time the user makes an outgoing call
- a user has access to all the enterprise features as long as the client has a session established to the server.
- the client GUI is used to provide access to these enterprise features to the user.
- SlF' signaling is used to establish voice calls between the client and the server.
- Voice from the audio receiver is encoded into one of the codecs supported by GlPS Voice Engine (VH), encapsulated into RTF packets, encrypted if needed, and sent on the IP interface to the server Similarly RTP packets received from server is decrypted if needed, decoded using one of the codecs and played out.
- Speech decoding, jitter control and error concealment are done by GIPS VE on the receive side.
- G ⁇ PS Voice Engine performs error concealment, jitter control, adaptive packet buffering. Acoustic Echo Cancellation and Suppression, Noise Cancellation and Suppression, Automatic Gain Control, Voice Activity Detection, Comfort Noise Generation [001 10] Roaming
- a handset client is a mobile device, unlike the portable laptops [001 12] 1 ntra-WL A N handofT
- an AP handoff could occur viz. the handset of the user is now associated with a different AP than the one the handset was previously associated with
- the AP handoff could occur without IP address change if the handoff is within the same subnet or to another subnet, in which case the IP address of the handset changes if the IP address changes, then the client needs to register with the server again.
- the established calls continue to flow in the meantime using the old flow information until the Voice-Engine (VE) is communicated of the new IP address.
- Voice-engine ensures that the RTP streams going out of the client will have the new- IP address
- the wireless client As a wireless client roams from one wireless AP to another, the wireless client must perform a full 802. iX authentication with each wireless AP, WPA allows the wireless client and the wireless AP to cache the results of a full 802. IX authentication so thai if a client roams back to a wireless AP with which the wireless client has previously authenticated, the wireless client needs to perform only the 4-vvay handshake and determine new pairwise transient keys.
- the wireless client In the Association Request frame, the wireless client includes a PMK identifier that was determined during the initial authentication and stored witli both the wireless client and wireless AP's PMK cache entries. PMK cache entries are stored for a finite amount of time, as configured on the wireless client and the wireless AP.
- the WPA/WPS IE Update calculates the PMK identifier value so that the PMK as determined by the 802.1 X authentication with the switch can be reused when roaming between wireless APs that, are attached to the same switch.
- This practice is known as opportunistic PMK caching
- a WPA wireless client can optionally perform 802.1 X authentications with other wireless APs within its range, while connected to its current wireless AP.
- the wireless client sends preauthentication traffic to the additional wireless AP over its existing wireless connection.
- a wireless client that connects to a wireless AP with which the wireless client has preauthenticated needs to perform only the 4-way handshake.
- WPA clients that support preauthentication can only preauthenticate with wireless APs that advertise their preauthentication capability in Beacon and Probe Response frames.
- WiFi-Celluiar handoff
- the 802 1 1 mini port goes to sleep Before going to sleep the handset tells the AP that the handset wishes to go to sleep by setting the power save bit in the 802 1 1 header of every frame.
- the AP receives the frame, and notices the client's wish to enter power save mode.
- the AP begins buffering the packets for the client while the client's 802. i i mini port is asleep.
- the mini port consumes very little power while asleep.
- the miniport wakes up periodically to receive regular beacon transmissions corning from the access point
- the power-saving clients need to wake up at the right time when the beacons are transmitted to receive the beacons
- TSF Transmission Synchronization Function
- TSF timer keeps running when stations are sleeping
- the 802.1 1 miniport When there are no incoming beacons for an extended period of time, the 802.1 1 miniport is put to sleep. The miniport periodically wakes up, probes the air for APs, if there axe none present mini port goes back to sleep, In this case, the mini port sleeps for longer duration than previous case.
- the apparatus may include an identification code (ID code) generator configured to generate an ID code.
- the apparatus may also include an ID code injector configured to inject the ID code into at least one of the signal and a processed signal to produce a convolved signal.
- the processed signal may be resulted from a processing of the signal.
- the apparatus may further include an ID code detector configured to detect at ⁇ east one of the convolved signals, a transformed signal, and a transformation of the convolved signal, the transformed signal resulting from the transformation of the convolved signal.
- the apparatus may further include an arithmetic function configured to remove at least one of the convolved signal and the transformed signal.
- Fig 4 depicts a method for codec based acoustic echo canceller in accordance with one or more embodiments of the present invention
- One embodiment of the present invention is a method for canceling echo during a communication between a Orst node and a second node.
- the method includes injecting a secret code to a signal input of the first node.
- the first node is a network device used by a far-end user
- the second node is a network device used by a near-end user.
- the first node is a network device used by a near-end user
- the second node is a network device used by a far-end user.
- a secret code is injected into the far-end signal input. So a single or multiple echoes of the far-end signal will carry on this secret code and arrive at the near-end signal input.
- the near-end signal also includes the near-end speaker voice. Since the secret code is carried only on the echoes of the far-end signal but not on the near-end talker's voice, the secrete code may serve as the identities of those echoes and help us to differentiate them from the near-end speaker voice.
- Some kinds of the matching filters can be employed iike the correlation or other means to identity the echoes of the far-end signal from the near-end speaker voice by the secret code and to remove them.
- the injector shown in Fig. 4 scrambles the secret code to a pseudo random noise, removes the existing background noise in the tar-end signal input, and then inserts the secret code random noise.
- the far-end signal detector will detect the far-end signal presence and trigger the secret code generator since the echoes will be present only when the far-end talker is speaking.
- the secret code pilot can include the secret code timing and the phase.
- the secret code pilot detector is used to detect the secret code pilot carried on the echoes of the far-end signal and to adjust the secret code delay to the matching filter because of the variable echo paths. The unscrambling process will be needed in the secret code pilot detector.
- the secret code and the secret code pilot may be designed so that the secret code detector and the matching filter can easily identify the echoes of the far-end signal, which carry this secret code and its pilot and then remove these echoes.
- a non-linear processor may be used after the matching filter to further reduce the residue echo and improve AEC performance.
- Echoes have been a significant problem in communication.
- a filter or echo canceller
- Fig 8 A shows a block diagram of an example prior -art corn muni cation device 800 (prior-art device 800) including a fl lter 814 (or echo canceller 8 ! 4) for echo cancellation,
- prior-art device 800 may include a signal receiver 802 for receiving far-end signals (e.g., signal y " ) from a remote (or far-end) party and a signal transmitter 818 for sending signals (e.g., signal ?..) to the remote part)'.
- far-end signals e.g., signal y "
- signal transmitter 818 for sending signals (e.g., signal ?..) to the remote part)'.
- Prior-ail device 800 may also include a speaker 806 for playing out the received signals to a user of prior -art device 800 (i.e., a local or near-end party) and a microphone 810 for collecting near-end signals (e g , signal x, which may include voice of the local party and background noises).
- a speaker 806 for playing out the received signals to a user of prior -art device 800 (i.e., a local or near-end party) and a microphone 810 for collecting near-end signals (e g , signal x, which may include voice of the local party and background noises).
- near-end signals e g , signal x, which may include voice of the local party and background noises.
- Prior-art dev ice 800 may also include buffer 812 for buffering signals received from signal receiver 802 and filter 814 for modeling an echo path 808 between speaker 806 and microphone 810 and for processing signals buffered in buffer S12.
- Echo path 808 may represent multiple paths of delay, attenuation, reverberations, etc , transforming signal y " into signal y I , for example.
- Prior-art dev ice 800 may further include sum mati on function 816 for subtracting outputs of filter 1.14 from outputs of microphone S lO, Prior-art device 800 may further include a signal feedback path for feeding outputs of the summation function 816 back to filter 814
- a signal (e g., signal y") received by signal receiver 802 may be forwarded to both speaker 806 and buffer 812.
- Riter 814 may receive the signal from buffer 812, process the signal with a model of echo path 808 to generate a cancelling signal (e.g , ⁇ 2, a function of y"), and send the cancelling signal to a summation function 81(>
- the output of summation function 816 may be fed back to the filter 814 for updating and improving the echo path model in filter 814.
- Fig. SB shows a flowchart of an example prior art method utilized, for example, in prior-art device 800 (shown in Fig. 8A), for cancelling echoes.
- the method starts with step S50, at which signal receiver 802 (shown in Fig. 8A) may send a signal y ⁇ Then, control may be transferred to step 852 and 854
- speaker 806 may receive signal y ⁇
- microphone 810 may receive a signal yi plus near-end signal x.
- Signal yl may represent a transformed signal of signal y' because of delay, attenuation, reverberations, etc. The delay, attenuation, reverberations, etc. may be caused by echo path 808 between speaker 806 and microphone 808 (shown in Fig. 8A).
- Signal x. may include the local party ' s voice plus local surrounding background noises picked up by microphone SiO.
- Signal x I that represents a combination of signal yl and signal x may then be sent to summation function 816 (shown in Fig 8A).
- buffer 812 may also receive signal y ⁇
- filter 814 may process signal y' with a model of echo path 808 to produce signal x2 s a function of y ⁇ e.g., f(y ) > which is then sent to summation function 816 (shown in Fig 8A).
- summation function 81.6 may subtract signal x2 from signal xl to produce a signal z. Ideally, if f(y ⁇ ) equals to yl, then z will equal to x, the near-end signal that is of interest to the remote party with echo (represented by y i ) removed However, the model of echo path 808 implemented in filter 8 S 4 may not be accurate, and typically z may not be equal to x.
- summation function 816 may send signal z to signal transmitter 818 for z to be transmitted the remote party.
- summation function 8 S 6 may feed signal z back to filter 8 i 4, for updating and improving the echo path model utilized at the step 858.
- the feedback of signal z and associated calculations and updates may cause filter S 14 to require additional processing time or processing power.
- the quality of signal z (i.e., the error of signal z with respect to signal x) may- depend on algorithms and echo path modeling implemented in filter S14 as well as the processing power and memory of the computing device implementing filter 814.
- correct modeling of echo path S08, as performed by filter 814 may be crucial for effectively cancelling echoes How surrounding noises, reverberations of the surrounding noises, and/or other factors, echo path 808 may be dynamic and therefore may be difficult to model, eoirectly As a ie>ulf, the prior art devices, arrangements, and methods may not be able to effectively cancel the echoes
- filter 814 may be unable to correctly identify which signals to be input into the model of echo path 808 As a result, part of the local party ' s voice may be cancelled, and part of echoes ma) not be cancelled, and the error of the echo path model m filter 814 may become divergent instead of converging, resulting in undesirable quality of communication
- filter 114 may require a large amount of data memory and may require a CTL(S) with high processing power As a result a high cost for implementing echo cancellation may be incurred
- the signal may represent a digital signal
- the apparatus may include an i dentin cation code (ID code) generator configured to generate &n ID code
- the apparatus may also include an ID code injector configured to inject the ID code into at least one of the signal and a processed signal to produce a convolved signal
- the transforation of the convolved signal may be caused by the configuration and/or environment of the apparatus For example, the transformation of the convolved signal may represent the delay caused
- Fig. 9A shows, in accordance with one or more embodiments of the present invention, a block diagram of a communication device 900 (device 900) that may cancel echoes even if a filter is not provided.
- the block diagram may also represent a communication system or arrangement with the components shown in Fig. 9 A implemented In one or more devices.
- Device 900 may include input/output components such as a signal receiver 904 (for receiving a far-end signals from a remote party), a signal transmitter 932 (for sending signals to the remote party), a speaker 914, and a microphone 916 (local microphone 916).
- a signal receiver 904 for receiving a far-end signals from a remote party
- a signal transmitter 932 for sending signals to the remote party
- a speaker 914 for sending signals to the remote party
- microphone 916 local microphone 916
- Device 900 may also include a signal -processing module such as a background- noise remover 906.
- Background-noise remover 906 may be configured to remove background noise from signals received from signal receiver 904. Background-noise remover 906 may be implemented utilizing one or more well-known algorithms such as spectral subtraction for removing the background noise.
- Device 900 may also include modules for canceling echoes.
- the modules may include identification code generator 922 (IB code generator 922), identification code injector 910 (ID code injector 910), identification code detector 924 (ID code detector 924), and buffer 926.
- the modules may also include a transformation module such as, for example, delay 928, for transforming signals such as, for example, introducing a delay.
- the modules may also include an arithmetic function such as, for example, summation function 930.
- ID code generator 922 may be configured to generate a controllable and removable ID code such that a portion of a signal may be identified. The portion of the signal may then be removed, for example, for echo cancellation purposes.
- the ID code may represent a pseudorandom code that may simulate a background noise or comfort noise, ID code generator 922 may include a linear feedback shift register for generating a pseudorandom noise sequence to be utilized as the ID code.
- the ID code may include a high frequency or low- frequency signal that is unperceivable to human ears.
- the sampling rate of microphone 916 may be configured to process the high frequency or low- frequency signal, for example, through configuring hardware and/or software (or driver) of microphone c >16.
- device 900 may not include background-noise remover 906.
- ID code injector 910 may be configured to inject the ID code generated by ID code generator 922 into a signal
- ID code injector 910 may be implemented by some well-known algorithms such as digital correlation for inserting the ID code into the signal, for example, by convolving the ID code with the signal to produce a convolved signal.
- ID code detector 924 may be configured to detect the ID code within the convolved signal, for example, in a mixed, superimposed, and/or further convolved signal involving one or more other signals.
- IO code detector 924 may be configured to detect a transformed signal resulted from a transformation of the convolved signal and/or the ID code; the transformation may be caused, for example, the configuration and/or environment of device 900.
- ID code detector 924 may be configured to detect the transformation.
- the transformation may include a delay and a signal level attenuation.
- ID code detector 924 may implement one or more well known algorithm such as digital correlation or match filter for detecting the ID.
- Delay 928 may be configured to introduce a delay into a signal.
- the delay may be employed in simulating the transformation.
- Delay 928 may be implemented by a simple delay line shift register for introducing the delay.
- Each of noise remover 906, ID code generator 922, ID code injector 910, ID code detector 924, and delay 928 may be included in software that may be downloaded to a user device such as, for example, a telephone, a mobile phone, a teleconference device, etc. (e.g., for acoustic echo cancellation) and/or a server device (e.g., for line or network echo cancellation).
- a user device such as, for example, a telephone, a mobile phone, a teleconference device, etc. (e.g., for acoustic echo cancellation) and/or a server device (e.g., for line or network echo cancellation).
- Fig. 9B shows, in accordance with one or more embodiments of the present invention, a block diagram of ID code generator 922 employed in device 900 (shown in Fig. 9A).
- ID code generator 922 may only include a code generator 921 which will generate a random code directly.
- the code generator 921 may be implemented by some well- known algorithms, such as linear feedback shift register with carefully selecting an appropriate feedback function.
- ID code generator 922 may include a code generator 921 followed by a randomizer 923.
- the code generator 921 can generate an appropriate identification code first without worrying about the randomization. Then this identification code is fed to the randomizer 923 to become a pseudorandom noise sequence as the output of 922.
- the randomizer 923 could be implemented by a modified finer feedback shift register with its feedback function controlled by the code generator 921.
- Fig. 9C shows, in accordance with one or more embodiments of the present invention, a flowchart of a method for cancelling echoes, for example, in device 900 (shown in Fig, 9A).
- the method starts with step 952, at which the signal receiver 904 (shown in Fig. OA) may receive a signal y'(n) from the remote party.
- noise remover 906 may remove background noise from yXn), resulting in a signal y(n).
- the background noise may be removed in order to make room for an ID code thai includes a random noise Accordingly, the local party may not receive excessive noise.
- ID code generator 922 may generate an ID code c(n).
- the ID code c(n) may represent a known and controllable function.
- ID code injector 910 ⁇ .shown in Fig. 9A) may injects the ID code c(n) into signal y(n).
- a convolution of cfn) and y(n) may be generated.
- the convolution of c(n) and y(n) may be a convolved signal c(n)*y ⁇ n).
- control may be transferred to step 962 and step 980.
- speaker 914 may receive the convolved signal c(n)*y(n).
- microphone 916 may receive a delayed signal from speaker 914, i.e., signal c(n-d)*y(n-d).
- Microphone 916 may also pick, up another input signal x(n), which may include voice of a local party (e.g , in a double-talk scenario) and/or background noise surrounding microphone 916.
- Microphone 916 may then output a combined signal x(n) ⁇ c(n-d)*y(n-d) to ID code detector 924 (shown in Fig. 9A) and summation function 930 (shown in Fig. 9A).
- buffer 926 may buffer a copy of convolved signal e(n)*y(n) and output the copy of the convolved signal to delay 928.
- ID code detector 924 may detect the (D code c(n-d) in the combined signal x(n) + c(n-d)*y(n-d) and may determine a delay amount d by comparing c(n-d) with c(n) received from ID code generator 922 given that c(n) is a known and controllable function. The delay amount d may be fed into delay 928 (shown in Fig. 9A). [0Oi 78] At step 982, delay 928 (shown in Fig. 9A) may introduce the delay amount d into the output of buffer 926 from step 980, Le., a copy of c(n)*y(n), resulting in a copy of c(n- d)*y(n-d).
- summation function 930 may subtract the output of step 982, i.e., the copy of signal c ⁇ n-d)*y ⁇ n-d), from the output of step 964, i.e., signal x ⁇ n) -*- e(n-d)*y(n-d). Sn other words, at step 990, summation function 930 calculates signal x(n) ⁇ c(n-d)*y(n-d) - c(n-d)*y(n-d) to obtain signal x ⁇ n), which may represent the input signal picked up by receiver microphone 916 (shown in Fig.
- Signal x(n) may include voice of a local party, e.g., in a double-talk scenario, and/or background noise surrounding microphone 916
- signal x(n) including voice of a local party, e.g., in a double-talk scenario, and/or background noise surrounding microphone 916 and containing no echo, may be sent to signal transmitter 932.
- echoes may be effectively canceled in both signal-talk and double-talk scenarios.
- embodiments of the present invention may effectively cancel echoes without the need of a filter (or echo canceller) that is required in a prior art device, arrangement, or method. Being immune to possible errors in echo path modeling that the filter may rely on, embodiments of the present invention may provide more accurate echo cancellation and faster cancellation, and therefore better quality of service. Further, the embodiments of the present invention may effectively cancel echoes in double-talk scenarios where conventional filters may usually perform poorly.
- embodiments of the present invention may also advantageously eliminate the netd for high CPU processing power and large data memory thai may be required by the filler, thereby reducing the cost in implementing echo cancellation.
- One or more embodiments of the present invention provide a mechanism to handle excessive WLAN jitter using VAD and jitter compensation for audio.
- One or more embodiments of the present invention work also for video where lack of motion or no motion is used in conjunction with packet jitter,
- the packet communication device may include a detector configured to detect a characterized content in incoming packets received by the packet communication device.
- the packet communication device may further include a play-cn.it control configured to perform an adjustment of the incoming packets to produce adjusted packets and output the adjusted packets, if the detector has detected the characterized content in the incoming packets.
- a new jitter buffer scheme called content-based jitter buffer is proposed to overcome the current jitter buffer technology limitation.
- the jitter buffer on the receiver side will no longer depend on the transmitter's silence suppression any more.
- Fig 5A-B gives a high level overview of the jitter buffer architecture. Is the path the packets will trace through functional blocks in the Voice Quality Engine (VQF,). The aim here is introduce an adaptive de-jitter controller to even out play-out. A similar scheme may be used to handle video jitter.
- VQF Voice Quality Engine
- a so-called receiver-side VAD voice activity detection
- a so-called receiver-side VAD voice activity detection
- the silence or talk spurt cue is used to flush the jitter buffer when the silence or talk spurt cue reaches the maximum length.
- the differences of the new scheme from the prior art design include that the silence or talk spurt cue is used to control when the play-out delay can be inserted to compensate the network packet jitter. So, in accordance with one or more embodiments of the present invention, the silence or talk spurt detection will become a key part of the jitter buffer scheme. Under some circumstances it may be too late to make any adjustment when the jitter buffer becomes overflow,
- FIG. 5 A shows a block diagram voice of a jitter buffer in accordance with one or more embodiments of the present invention.
- the core jitter buffer includes one or more components for packet queuing, packet play -out, jitter calculation and jitter compensation.
- the decoder and VAD will generate a silence or talk spurt indicator.
- the silence or talk spurt indicator is then fed back to the jitter compensation part and used to decide when to insert the play-out silence to compensate the network packet jitter
- FIG. 5B shows a block diagram of a video jitter buffer in accordance with one or more embodiments of the present invention
- the core jitter buffer is similar to voice ' s one, except the play-out delay will be inserted when there is no motion or very low motion on the video frames.
- the motion estimation and the motion compensation will generate a residue frame.
- a no-motion indicator can be formed from this residue frame plus some specific threshold. The no-motion indicator then fed back to the jitter compensation part and used to decide when to insert the play-out silence to compensate the network packet jitter In video, inserting the play-out silence is actually to stop playing out the new frame while repeating the previous video frame.
- Packet delays and packet delay variation may also be known as jitter.
- a fixed de-jitter buffer scheme may be employed to compensate the late arrivals of packets by periodically inserting delays (e.g., in the form of silence packets or comfort noise packets) when playing out packets from a packet buffer.
- delays e.g., in the form of silence packets or comfort noise packets
- a transmitter-side voice activity detector may also be employed for adaptiveSy inserting delays, thereby compensating packet delays and packet delay variations.
- the transmitter- side VAD may not be supported by some user devices.
- the transmitter-side VAD may cause undesirable noise or choppy voice, for example, when a transmitting party is performing music playback, because pauses in music may be treated as silence and inappropriately handled
- the transmitting party uses G.729AB codec with the transmitter-side VAD turned on to play out some music
- the user in the receiver side may perceive distorted music. Therefore, the transmitter-side VAD may be commonly turned off by packet communication service providers and may not be able to compensate packet delays and packet delay variations. As a result fixed de-jitter buffer scheme may still be employed, and the quality of service may still be undesirable to a receiving party.
- a receiver-side silence detector may be employed for controlling packet buffer overflow, for preventing packet loss.
- voice packets may be discarded and therefore lost when the packet buffer is nearly full or is full, and the quality of service r ⁇ a ⁇ be undesirable to the receiving party
- embodiments of the present invention may employ a receive! -side silence detector for timely compensating delays and delay variations and adaptkely playing out packets from the packet buffer
- the transmitter -side VAD is not needed, and desirable quality of service may be provided
- one or more embodiments of the present invention may employ a receiver-side video detector, thereby adaptive!' handling jitter in video communication
- the present invention relates, in one or more embodiments, to a packet communication deuce that ma) include a detector configured to detect a characterized content in incoming packets received by the packet communication device
- the characterized content may represent silence (e g , a time period with no voice packets received) in voice communication
- the characterized content may represent at least one of no motion and an amount of motion that is lower than a threshold
- the threshold of a no-motion or still picture may be selected to be 10% to 15% (in terms of data volume) of the full active picture in video communication
- the packet communication device may further include a play-out control configured to perform an adjustment of the incoming packets to produce adjusted packets and output the adjusted packets, if the detector has detected the characterized content in the incoming packets
- the adjustment may include insertion of a delay, for example, in the form of silence packets or comfort noise packets Alternatively oi additionally, the adjustment may include repeating playing out packets that have been played out .As a result, the delays and delay variations of the incoming packets received at the packet buffer may be timel) compensated, and the adjusted packets may be of acceptable quality to the receiving party
- Fig I OA shows a block diagram of a first example prior art packet voice communication arrangement (first prior art arrangement) with an adaptive jitter buffer scheme
- the first prior art arrangement includes a transmitter-side device 10*51 and a r ⁇ ccivct-sidc device 1002, connected through network 1003
- Each of transmitter-side device 1091 and receiver-side device 1092 may represent a telephone, a mobile phone, or a teleconference device.
- Transmitter-side device 1091 may include the following components: speech buffer 1000, voice activity detector 1001 (VAD 1001), and transmitter 1002. These components may be described as follows;
- Speech buffer 1000 may be configured to receive voice packets (packets) from a microphone, buffer the packets, and then transmit the buffered packets to VAD 100 i .
- VAD iOOl may be configured to insert a silence descriptor (SID) when there is silence (i.e., a period of time between voice packets) in the packets received from speech buffer 1000.
- SID silence descriptor
- Transmitter 1002 may be configured to receive the packets from VAD 1001 and transmit the packets to network 1003.
- network 1003 may transmit the packets to receiver-side device 1092.
- Receiver-side device S 092 may include the following components: packet buffer 1004, packet play-out control 1005., delay insertion control 1006, delay information module 1007, jitter calculator 1008, and play-out delay calculator 1009. These components may be described as follows:
- Packet buffer 1004 may be configured to receive the packets from network 1003, buffer the packets, and then send the packets to jitter calculator 1008, delay insertion control 1006, and packet pi ay -out control 1005.
- Jitter calculator 1008 may be configured to calculate the size of jitter in the packets.
- the jitter may represent silence, i .e., a time period between arrivals of two voice packets with no data.
- Delay insertion control 1006 may be configured to determine when to insert delays based on SlDs inserted in the packets by VAD 1001 of transmitter-side device 1091.
- Delay insertion control iO ⁇ may receive jitter size information from jitter calculator 1008 and may receive packets from packet buffer 1004.
- Play-out delay calculator 1009 may be configured to receive jitter size information from jitter calculator 1008. Based on the jitter size information, play-out delay calculator 1009 may calculate sizes of delays to be inserted into the packets. [0021 1] Delay information module 1007 may be configured to consolidate information from delay insertion control 1006 regarding timing for inserting the delays and information from play-out delay calculator 1009 regarding the sizes of the delays. Accordingly, delay information module 1007 may build the consolidated information into a data structure and send the data structure to packet play-out control 1005.
- Packet play-out control 1005 may be configured to receive packets from packet buffer ! 004 and insert delays into the packets, according to the data structure received from delay information module 1007
- Fig. I OB shows a flowchart of a transmitter-side process of a prior art jitter buffer scheme utilized, for example, in the first prior art arrangement shown in the example of Fig 10A.
- the transmitter-side process starts with step 1060, at which speech buffer 1000 (shown in Fig. ! 0Aj may receive packets, for example, from the microphone used by a transmitting party. Speech buffer 1000 many then buffer the packets
- speech buffer 1000 may set the marker bit of each packet to 0 by default.
- the marker bit of the packet may be set to I if the packet is the first voice packet of a talk spurt. Otherwise, the marker bit may be kept to O.
- VAD 1001 may determine whether the packets contain one or more silence periods (i.e., one or more time periods with no data between packets). If the packets contain one or more silence periods, control may be transferred to step 1074; if not, control may be transferred to step 1066.
- silence periods i.e., one or more time periods with no data between packets.
- VAD 1001 may determine whether a SID(s) have been set in the packets.
- a SiD sience descriptor
- a SiD is configured to mark the beginning of a silence period. If the SID(S) have been set for a sslence period(s) in the packets, control may be directly transferred back to 1072, if not, control may be transferred to step 1076 before being transferred to step 1072, At step 1076, VAD 100! may generate the SID(s) for the packets.
- transmitter 1002 shown in Fig. 10A
- VAD 1001 may determine whether the packets contain a first voice packet(s) after a silence period(s). If the packets contain a first voice ⁇ acket(s), control may be transferred to 1068, at which VAD 1001 may set the marker bit(s) for the first voice packet(s) to 1. If the packets contain no first voice packetfs), control may be transferred to step 1072, at which transmitter 1002 may transmit the packets to network 1003.
- Fig. 1OC shows a flowchart of a prior art delay calculation process.
- the delay calculation process may be part of the receiver side process utilized, for example, in receiver- side device 1092 of the first prior art arrangement shown in Fig. 1OA.
- the delay calculation process may be performed involving packet buffer 1004, delay insertion control 1006, jitter calculator 1008, play-out delay calculator 1009, and delay information module 1007 of receiver-side device 1092 shown in the example of Fig, 1OA.
- the deiay calculation process may start at step 1022, at which packet buffer 1004 may receive packets from network 1003 and buffer the packets.
- the packets may represent packets transmitted by transmitter 1002 (shown in Fig. 10A) at step 1072 (shown in Fig. 1.0B).
- jitter calculator 1008 may calculate an average jitter j. [00221 ] At step 1026, jitter calculator 1008 may calculate j itter deviation v.
- play -out delay calculator 1009 may calculate a play-out delay using j and v and based on a network mode! represented by f(j, v), i.e., deiay d ⁇ f(j, v).
- delay insertion control 1006 may determine whether packet buffer 1004 is empty. If packet buffer 1004 is empty, control may be transferred to step 1038; if not, control may be transferred to step 1032,
- delay insertion control 1006 may determine whether marker bit(s) of value 1 have been set. If the mark bit(s) of value 1 have been set, control may be transferred to step 1038; if not, control may be transferred to 1034.
- delay insertion control 1006 may determine whether there is a SID(s) in the packets. If there is a SlD(S), control may be transferred to step 1038; if not, control may be transferred to step 1036.
- delay insertion control 1006 may determine whether the average jitter j is greater than a predetermined threshold.
- the threshold here may be the length of packet buffer 1004.
- control may be transferred to step 1038; if not, control may be directly transferred to step S 040.
- delay information module 1007 may consolidate size and timing information for inserting delays, then control may be transferred to step 1040 [00229] At step 1040, information pertaining to inserting delays may be output to play-out control 1005.
- Fig. 101 shows a flowchart of a prior art packet play-out control process.
- the packet play -out control process may be part of a receiver side process utilized, for example, in receiver-side device 1092 of the first prior art arrangement shown in Fig. 1 OA .
- the packet piay-out control process may be performed by packet play-out control 1005 shown in Fig 1OA.
- the packet play-out control process starts at step 1042, at which packet play-out control 1005 may receive packets from packet buffer 1004 (shown in Fig. IC)A) and may receive the information pertaining to inserting delay as a result of step 1040 (shown in Fig. 10C) from delay information module 1007 (shown in Fig. K)A).
- packet piay-out control 1005 may determine whether enough delays have been inserted. If enough delays have been inserted, control may be transferred to step S.048; if not, control may be transferred to step S.046.
- packet play -out control 1005 may insert delays (e.g., in the form of silence packets or comfort noise packets) into the packets received from packet buffer 1004.
- delays e.g., in the form of silence packets or comfort noise packets
- packet play-out control 1005 may retrieve packets from packet buffer 1004.
- packet play-out control 1004 may play out packets resulted from steps 1046 and 1048.
- Fig. 10E shows a schematic representation of received packet How at packet buffer 1004 (shown in Fig. I OA) when the transmitter-side VAD !0Ol (shown in Fig. I OA) is turned on.
- the received packet flow may include voice packets 1080, silence 1084 following voice packets 1080, voice packets 1.086 following silence 1084, silence 1.88 following voice packets 1086, etc.
- Silence 1084 and silence 10S8 represent time periods during which no voice packets are received at packet play-out control 1005. Since VAD 1001. is turned on, VAD 1001 may have set marker bits of first voice packets such as packets 1080a and 1086a to ! .
- the marker bits of value 1 may be utilized at step 1032 shown in Fig. K)C for determining when to insert delay
- VAD 1001 may have inserted SiD 1082 at the beginning of silence 1084 and SLD 1090 at the beginning of silence 1088. SlD 1082 and SID 1090 may also be utilized at step 1034 shown in Fig IOC to determine when to insert the delay.
- Fig 1Oh shows a schematic representation of reeeh ed packet flow at packet buffer 1004 (shown in Fig !0A) when transmitter-side VAD 1001 ⁇ shown in Fig 10A) is turned off
- VAD IUOl may commonly be turned off by packet communication sen ice and therefore may not be able to provide information related to voice activity
- the received packet flow may include voice packets 10 ⁇ 2. silence packets 10*54 following voice packets 1002, voice packets 10% following silence packets 1094, silence packets 198 following voice packets 10%. etc Because VAD 1001 is turned off, there may be no SlD inserted for the silence periods represented, for example, by silence packets 1044 and silence packets iO L >8 As a result, step 1034 (i e , detecting SIDs) shown in Fig 1OC may not be performed
- step 1032 determining whether mark bit values for first packets are set to I ) shown in Fig 1 OC may not be performed
- step 1030 i e . determining whether packet buffer 1004 is empty
- Fig 1OC may not be performed as designed
- delay insertion control 1006 may not be able to perform steps 1030, 1032, and 10 >4 for determining the timing for inserting delays
- delay insertion control 1006 may still be able obtain information regarding whether the average jitter j ⁇ i) is greater than the predetermined threshold, the information is not sufficient for determining the timing for inserting the For example, when the average jitter j(i) is greater than the predetermined threshold, it ma> base been to late to insert the delays Consequently, the delays may be inserted at inaccurate timing, causing choppy voice in voice communication
- VAD 1001 Even if VAD 1001 is turned on. existing VAD algorithms may not enable V ⁇ D 1001 to insert SlDs precisely ⁇ s a result front-end clipping and 'or rear end clipping of voice packets may occur, and voice quality may be undesirable to a reeeh ing patty
- Fig 11 ⁇ shows a block diagram of a receiver-side device 1 100 of a second prior art packet voice communication arrangement (second prior art arrangement), which includes adaptiv e buffer o ⁇ ertlow control
- receiver-side ice 1 100 includes the components of receiver-side device 1092 in the first prior art arrangement shown in Fig 1OA
- recei ⁇ er-side device 1 100 includes additional component's i 180
- the additional components ! I 80 may include decoder 1118, silence detector 1 S i 6. and buffer overflow control U S 4, described as follow 6
- Decoder 1 118 may be configured to decompress voice packets
- Silence detector J 116 may be configured to detect silence in the packets received from decode* 1 1 18 If there is silence, then silence detector 1 1 16 ma) sei a silence flag value to i If there is no silence, silence detector 1 1 16 may set the silence flag value to 0
- Buffer overflow control 1 114 may be configured to monitor the status of packet buffer 1 102 According to the status of packet buffer 1 102.
- buffer overflow control 1 S 14 may determine whether to drop or to keep next packets received at packet buffer I i 02
- Fig J IB show s a flowchart of a silence detection process, utilized for example, in receiver-side 1 100 shown in the example of Hg 1 IA fhe silence detection process starts at step ⁇ 120, at which decoder 1 1 18 ⁇ &hovvn in Fig 1 IA) may decompress voice packets (packets) received from packet play-out conUol S 104 (shown in Fig 1 1 ⁇ )
- silence detector 1 116 may determine whether there is silence in the received packets. If there is silence, control may be transferred to i 130, at which silence detector 1 1 16 sets the silence flag value to 1 If there is no silence, control may be transferred to step 1 126, at which silence detector 1 1 16 sets the silence flag value to 0
- silence detector 1 116 may output the silence flag value
- Fig 1 1C shows a flowchart of a buffet overflow control process utilized, for example, m receiver-side device 1 100 ⁇ b own in the example of Fig 11 A
- the buffer overflow control piocess may be performed by buffer o ⁇ ertlow control 1 1 14 t>hown in Fig 1 1 ⁇
- the buffer overflow control process starts at step S 1 32, at which buffer overflow control 1 1 14 receives the silence flag value from silence detector 1 116 (shown in Fig 1 IA)
- buffer ovetflow contiol 1 1 14 may determine whether packet buffer i 102 (shown in Fig 2A) has reached a first threshold such as, for example, 100% full If packet buffer 1 102 has reached the first threshold, control may be transferred to step 1 144. if not, control may be transferred to step I i 36.
- a first threshold such as, for example, 100% full If packet buffer 1 102 has reached the first threshold, control may be transferred to step 1 144. if not, control may be transferred to step I i 36.
- buffer overflow control 1 1 14 may command packet buffer 1 102 to discard newly received packets, regardless of whether the newly receiv e packets represent voice packets Buffer overflow control idc packets to be pia> ed out
- buffer overflow control i 114 may determine whether packet buffer i 102 has. reached a second threshold such as, for example, 80% full If packet buffer 1 102 has reached the second threshold, control mav be transferred to step 1 140. if not, control may be transferred Io step H 38
- buffci overflow control 1 L 14 may determine whether the silence Hag value received from silence detector 1 1 i ⁇ i& I If the silence flag value is 1, control may be transfcircd to step 1 142. if not, control may be tramfeired to step 1 138
- buffer overflow control 1 1 14 may command packet buffer 1 102 to discard newly received packets * since the newly received packets may represent silence
- Buffer overflow control 1 114 may also command packet buffer 1 102 to provide packets to be played out Control may then be transferred to step 1 138
- packet buffer 1 102 may receive and buffer packets
- Receiver-side device 1200 may represent a user device such as, for example, a telephone, a mobile phone, a teleconference device, an audio player, or a video phone.
- receiver-side device 1200 may represent a server device in a packet communication network.
- receiver-side device 1200 may include one or more of the following components' packet buffer 1202, packet play-out control 1208, decoder ⁇ 210, delay insertion control 1214. delay information module 1216, jitter calculator 1204, and play -out delay calculator 1206 Receiver-side device 1200 may further include a detector configured to detect a characterized content such as silence detector 1212 for detecting silence.
- Silence detector 121.2 may be configured to receive decompressed packets from decoder 1210, Silence detector 1212 may further be configured to process the decompressed packets and provide a silence flag (but not the decompressed packets) to delay insertion control 1214 through link 1299.
- One or more of the components may be included in software that may be downloaded into receiver-side device 1200
- receiver-side device 1200 may have capabilities similar to capabilities of components of receiver-side device I 100 shown in Fig. 1 IA. However, in contrast with silence detector 1 1 16 of receiver-side device 1 100, silence detector 1212 may be configured determine when to insert delays for handling jitters instead of or in addition to controlling packet buffer overflow.
- delay insertion control 1214 may receive information from silence detector 1212.
- Delay insertion control 1214 may be directly coupled to silence detector 1212 through link 12W Link 1299 may represent a direct logical Sink or physical link. There may be no direct logical or physical connection between jitter calculation 1204 and delay insertion control 1214, in contrast with link 1 190 between jitter calculator 1 1 10 and delay insertion control i 108 shown in the example of Fig. I S A and link 10*59 between jitter calculator 1008 and delay insertion control 1006 shown in the example of Fig 1OA.
- Fig. 12B shows, in accordance with one or more embodiments of the present invention, a delay insertion control process utilized for adaptive jitter handling utilized, for example, in receiver-side device 1200 shown in the example of Fig. 12A.
- the delay insertion control process starts with step 1220, at which delay insertion control 1214 (shown in Fig. 12A) may determine whether packet buffer 1202 (shown in Fig. 12A) is empty, i.e , containing no packets for playing out If packet buffer 1202 is empty, control may be transferred to step !228, if not, control may be transferred to 1222
- delay insertion control 1214 may determine whether the marker bit(s) of ⁇ alue 1 are set in incoming packets that are received through packet buffer 1202 If the mark bit(s) of value 1 aie set. control ma> be transferred to step 1228, if not, control may be transferred to 1224
- delay insertion control 1214 may determine whether there is a SlD(s) in the incoming packets If there is a S ⁇ D(s), control may be transferred to step 1228. if not, control mas be transferred to step 1226
- delay insertion conttol 1214 may determine whether the silence flag value received from silence detectoi 1212 (shown in Fig 12A) h 1 If ⁇ he t ⁇ lenee flag ⁇ alue a ' > ⁇ , control may be transferred to step i228, if not, control may be transferred to step i 230
- step 122S 1 packet play -out control 1208 may insert dela> s (e g , silence packets or comfort noise packets) into the incoming packets according to information received from delay information module 1216 (shown in Fig. 12A) to generate adjusted packets 1 he delay information includes size information provided by p!a> -out de!a> calculator 1206 (shown in Fig 3A) and timing information ⁇ ro ⁇ ided by delay insertion conttol S2I4
- packet pia> -out control 1208 may play out the adjust packets
- the adjusted packets may be decompressed by decoder 1210 and then be played out by receiver- side device 1.200
- delay insertion control 1214 may determine the timing for inserting delay s based on silence flag value received from silence detect oi 1212 (at step 1226) even if no information is received from jitter calculator 1204
- Receiver-side dev ice 1300 may represent at least one of a telephone, a mobile phone, a teleconference a ⁇ ideopiione, and a video player Alternative! or additionally, receiver -side device 1300 may represent a server device in a packet communication network.
- Receiver-side device 1300 may include components performing functions similar to functions of components of receiver-side device !2OC) shown in the example of Fig.
- Receiver-side device 1300 may include one or more of a packet buffer 1302, a jitter calculator 1304, a compensation control S314, a compensation calculator 1306, a compensation information module 1316, a packet play -oat control 1308, decoder 1310, and a video detector 1312.
- video detector 13 12 may be configured to detect no motion or Sow motion in video packets, instead of silence. Further, instead of being configured to calculate and consolidate Information for delay insertion, compensation 1306, compensation control 1314, and compensation information module 1316 may be configured to calculate and consolidate information for video compensation The video compensation may include stopping playing new video frames while repeating video frames and may be performed, by packet pi ay -out control 130S.
- compensation control 1314 may be directly coupled to video detector 1312 through link 1399 for determining timing for the video compensation.
- the video compensation control process for jitter handling utilized in receiver-side device 1300 may be similar to the delay insertion control process shown in the example of Fig, S 2B.
- One or more embodiments of the present invention may involve a receiver-side device that includes a configuration similar the configuration of receiver-side device 1300 and is configured to handle jitter in multimedia communication that includes voice and video. Further, one or more embodiments of the present invention may involve a delay insertion control and video compensation control process that is similar to the delay insertion control process sl ⁇ mn in the example of Fig. 12B
- embodiments of the present invention may effectively handle jitter in packet communication without depending on a transmitter-side voice activity detector ( VAD) or a fixed jitter buffer scheme.
- VAD voice activity detector
- embodiments of the present invention may accurately insert delays without unnecessarily inserting delays into voice packets
- choppy voice may be reduced, and voice quality may be ensured.
- embodiments of the present invention may be utilized in video communication and/or multimedia communication
- One or more embodiments of the present invention include a lightweight protocol over SIP that will efficiently transport information between the server and the client and will work independent of the hardware and software platforms.
- DDP has been architected taking the following factors into consideration:
- DDP Independent of server and client hardware and OS:
- the structure and format of the protocol is such that DDP is agnostic of the server or handset hardware platform as well as the operating system running on both of the platforms.
- the protocol is architected and designed to run on any server or handset hardware platform and is independent of the Operating System/SW platform running as well
- DDP may run on Linux, Syr ⁇ bian, Windows Mobile 5.0, etc.
- no special adapter layer needs to designed or developed every time this module has to be ported on to a new hardware or software platform.
- DDP Decoupled from control plane protocol: DDP has been architected such that is can be used with any of the control plane technologies that is use on a given platform - i.e., SIP,
- UDP and TCP Has an optional module to ensure a level of reliability and performance (using
- This reliability module removes the burden on higher layer application to worry about guaranteed delivers ' especially in environments with, high packet loss.
- DDP will be used for a wide range of application ranging from critical control plane messages with strict real time requirements to application thai need to transfer large amounts of data between the server and the client.
- Optional module within DDS* enables the application to transfer files and buffers between the server and client.
- the protocol also does not care about the type of the application data - i.e. binary, text.
- Service Priority Level Enables the scheduling and queuing of messages with different priority levels for application with different delay and service requirements.
- Optional module within DDP allows the server and handset to set up a secure tunnel at initialization and all further exchange of DDP messages are encrypted providing a level of security for applications that need encryption. This will still allow applications to exchange unencrypted messages for such applications that do not need encryption.
- the protocol Is independent of the medium over which the client is connected to the server
- the session could be over WiFi, cellular data channel or wired Ethernet.
- Fig 6 A shows an overview of a DDP architecture that is fabricated in accordance with one or more embodiments of the present invention.
- DDl* is a session layer application that tuns over SlP protocol.
- the different modules within DDP in accordance with one or more embodiments of the present invention-
- i DDP Message Handler This is comprised of the parser and the message- formatting module
- the parser is responsible for checking the validity of a received DDP message and extracting the various information pieces before invoking the callback handlers.
- the formatting module takes the information from a higher-level application and formats the DDP message before the DDP message is packed in to a signaling message packet [00292]
- ii Session Management An inbuilt mechanism to evaluate the health of the DDP session between two peers and mechanisms for informing the registered applications if the session fails.
- DDX Divitas Data Transfer
- the DDX module will work independent of the tile format or the buffer contents and has mechanisms for error cheeking and confirmation of deliver ⁇ ' [002%]
- DDPS The module in DDP that encrypts and decrypts the DDF contents before they are inserted in the signaling packets.
- DDP has a protocol for establishing the secure
- Fig 6B shows the exchange of DDP messages during the initialization of a client when a user logs on to one of the devices in accordance with one or more embodiments of the present invention
- DDP is a
- DDP can use TCP, UDP or TLS for transport. Similar to SlP or SDP, DDP is a text-encoded protocol ⁇ n accordance with one or more embodiments of the present invention, a DDP message comprises a sequence of lines or fields wherein each line of field begins with a single lower case letter which denotes the type of information that is being conveyed; the rest of the line or field contains pieces of information associated with a function or method. In accordance with one or more embodiments of the present invention, there can be multiple lines or fields with the same starting name or type.
- each DDP message comprises a set of mandatory lines or fields and optional lines or field, depending on the specific type of DDP message being sent. If any of the mandatory lines are missing, a parser will reject the DPP message. Optional lines that the parser cannot understand are skipped over. This allows for backward compatibility and interoperability between different versions of software.
- a DDP message is an example of a DDP message.
- c qos delaylo 50 delay hi 100 losslo 1 losshi 10 jitter ⁇ o 30 jitterhi 50
- the DDP message is then added as a message body in a SIP message with a message body type of "application/ddp" or "application/ddps"
- the DDP body can also be sent with other signaling protocols if required.
- Exemplary applications of DDP in accordance with one or more embodiments of the present invention are described as follows.
- DDP Voice Mobility Voice mobility depends on a lot of factors - the primary one being the WiFi quality experienced by the client.
- DDP is used to send the WiFi report in real time with information about the AP that the handsel is currently associated with to make mobility decisions.
- the WiFi report can also optionally contain information about the neighboring APs so that the mobility server can use this information to take preemptive mobility decisions baaed on the predicting the movement of the handset.
- DDP is also used for user initiated mobility decisions.
- Client/Device Management DDP is used extensively in managing the client and the user experience on the handset. Here are some of the different way in which DDP based control and bulk transfer messages are used for managing the client' a.
- Device Configuration Sending device specific configuration to the device during initialization once the device/user have been authenticated b. Mobility Thresholds. WiFi thresholds based on administrator settings for the client to initiate mobility actions. c User information- When a user logs on to one of the clients, the server pushes the user specific information (like extensions, preferences etc ) over DDP. d Device Image Management: Ability to upgrade the handset software over the air is achieved using DDP bulk transfer capability,
- Yoicemail/Eniail download to handset One of the key differentiator of the Divitas solution is the ability to download soicemails to the handset and manage them at a time of your convenience.
- the ability to manage voicemails without IVR is possible by proprietary- control messages that interface with the Voicemai! system as well the bulk transfer capability in DDP to transfer the voiceraa ⁇ s to the handset,
- a similar functionality can also be achieved for Email system where an adapter module can be built to interface with the Email system of choice.
- DDP messages with the user's preference for voice and text over the different medium is communicated to the server for presence management. This is a key piece of functionality that allows the support of Presence aware calling.
- the architecture and design of Rendezvous calling is also based on enhanced presence and user preferences - al! communicated over DDP to provide the service Rendezvous calling is designed to provide.
- Instant Messaging The messages for IM are tunneled over a DDP session This allows the IM client on the handset to be unaware of the medium protocol in which the device is operating
- FIG 14 shows a prior art example of a cai! flow for establishing a connection between an application client and an application server
- a user of a handset wanfc to employ an application client 1404 to request for a software download 1406 sia a web browser tlu ⁇ ugh a HTTP (hypertext transfei protocol) connection
- an HTTP connection may first has'e to be established between application client 1404 and application sen er 1402 At a first step
- application client 1404 may send a TCP (transmission control protocol) SYK
- application server 1402 may send a TCP SYN-ACK (TCP synchronization acknowledgement) back to application client 1404 At a step 1412.
- application client 1404 may send a TCP AOK to application server 1402
- application client 1404 may send an HTTP
- step 1414 application client 1404 is sending the uset ' s request for a software download 1406 to application sener 1402
- I pon receh ing the I ITFP (let, application server 1402 nia> perform a search to locate the requested download, at a next step J 416
- application server 1402 may begin sending the requested software as data packets (e g . ⁇ CP data segments > to application client 1404
- the software file maj be broken into a plurality of data packets in order to facilitate the process of sending the software file through the network
- application client 1404 may send a TCP ACK to application server 1402
- Steps 1418 and 1420 may be repeated until all of the data packets for the requested software download hav e been sent by application server 1402 to application client 1404
- application server 1402 may send an HTTP 200 OK to application client 1404.
- HTTP 200 OK application server 1402 is notifying application client 1404 that ail data packets related to the software download request, have been sent.
- application client 1404 may send a notification 1424 to the user informing the user that the download lias been completed.
- each application client on a handset the method described in the call flow of Fig. 1 may have to be performed by each application, client.
- the handset includes multiple application clients (e.g., video application client, voice application client, instant messaging application client, game application client, virtual reality application client, etc.)
- an independent channel may have to he established between each application client and its corresponding application server before interaction between the application client and the application server may commence.
- communication between the different applications is not guaranteed.
- an application running on a given client may be unaware of the data exchange that may be happening for another application on the same client,
- Fig. 1 the method described In Fig. 1 is a cumbersome method that may require each application on a client to be properly configured in order to assure that the application may successfully interact with its corresponding application on a given server within an enterprise. This method could create both security risks and increased complexity- by requiring that a separate network session be allowed for each of the applications that communicate between a client and a server.
- the inventors herein realized that a single protocol that is independent of hardware (e.g., handset) and software (e.g., video application client, voice application client, instant messaging application client game application client, virtual reality application client, etc.) may he employed to consolidate all of the applications network sessions.
- a protocol may be implemented that takes advantage of existing control and transport protocols but is hardware and software Independent, thereby allowing a plurality of application clients to interact with its corresponding plurality of application servers.
- a mobility architectural arrangement is provided by Implementing a DiVitas description protocol (DDP),
- the DDP may include a DDP client and a DDP server.
- Embodiments of the invention enable the DDP to efficiently transport data packets between a plurality of application clients on a handset and a plurality of application servers within an enterprise.
- Embodiments of the invention also enable DDP to be implemented independent of the hardware and software platforms.
- the DDP is independent of the hardware platform
- the DPP may be implemented on dual-mode handsets, personal digital assistants (PDAs), 802. i 1 telephones, and the like
- the DPP is also independent of the software platform, As a result, the DPP may be run on a
- the establishment of multiple network .sessions may require multiple channels to be established between the client and the server.
- a plurality of "holes' ' may be "punched" into the firewall of the enterprise in order to enable the plurality of application clients to interact with their corresponding application servers.
- DDP may be implemented to establish a single secure channel through which interaction between application clients on a handset and application servers within ars enterprise may be conducted.
- the information that is downloaded onto the handset may be managed b ⁇ the application client
- an application client that may require the utilization of information that has already been downloaded does not have to request for the data to be downloaded again Instead, the mobility client with DDP may be able to direct the application client to the storage location of the requested data.
- the DDP may be independent of the network in an example, the secure channel established by the DDP may be through Wi-Fi network or a cellular data network, for example This enables DDP to ensure that a network session can be handed off to a separate network, when a user on a client device roams.
- the DDP is built on top of a control protocol and a transport protocol.
- the DDP may be implemented with any available control protocol (e g , SIP, H 323, etc.)
- the DDP may be implemented with any available transport protocol, such as a user datagram protocol (UDP), a transmission control protocol ( FCP), or a transport layer security (TLS K for example.
- UDP user datagram protocol
- FCP transmission control protocol
- TLS K transport layer security
- the DDP may include a reliability module (RDDP), which may ensure a level of reliability for the delivery of (he data traffic This module is useful when utilizing a transport protocol, such as UDP, that does not provide reliability.
- RDDP may provide assurance of a successful transfer and remove the burden of monitoring the data traffic from the application clients,
- the DDP may be implemented for a plurality of applications (i.e., application clients and their corresponding application servers).
- the DDP may be employed by a simple application that may not require real time exchange of data.
- the DDP may be employed by an application that has real time requirements for the exchange of data. Due to the DDP adaptability, applications may be added or removed without impacting the capability and versatility of the DDP.
- DDP may include a priority message scheduler module which may be configured to schedule and queue data traffic. The DDP may employ the priority message scheduler module to automate the plurality of downloads and uploads that the plurality of applications may need or require
- Fig. 1 5 shows, in an embodiment of the invention, a simple architectural diagram of the DDP invention.
- DDP 1536 is independent of hardware and/or software platforms,
- DDP 1536 may be implemented on a plurality of client devices, including, but are not limited to, dual-mode handsets, PDAs, laptops, and the like.
- DDP 153t> may be implemented with different operating systems, such as, a Linux® system, a Symbian ⁇ system, a Window TM Mobile 5.0 system, and the like. As a result, DDP 153t> may be loaded omo different hardware and/or software platform with minimal modification
- DDP 1536 may be built on top of a control protocol, and a transport protocol
- DDP 1536 may be used with different type of control protocols (e g , SIP 1532 and other control protocols 1524) and different type of transport protocols (e.g , UDP 1534, UDP 1528. TCP 1530, TCP 1526, etc).
- the type of control protocol and/or transport protocol that may be employed by DDP 1536 in order to perform its function may be easily adapted by DDP
- DDP 1536 will adapt itself to utilize any combination of available transport and control protocols as required
- changes to the control protocol and/or the transport protocol do not impact the application layer which may include, but is not limited to.
- DDE* 1 53b in an embodiment, that is capable of determining the preferred transport protocol to provide the best performance and reliability
- DDP 1536 Sitice all the data traffic between a DDP client and sen er is now handled b> DDP 1530
- DDP 1 536 may be able to determine the best transport protocol for rowing data traffic while minimi/ing the possibility of data packet loss
- DDP 1536 ma ⁇ include one or more modules, such as a DDP with securit) extension module (DDPS module 1522). a priority message schedule? module 1518, a reliable DDP module (RDDP module 15 16). a built-in session management module ] 520, and a Di Vitas data exchange module (DDX module 1 514)
- DDPS module 1522 may proskle security functionality to DDP 1536
- DDPS module 1522 may enable a secure channel to be established between a mobility client of a handset and a mobility server within an enterprise With a secure channel, all incoming and outgoing data traffic from the plurality of applications ma ⁇ be routed Ihjough a single secure channel
- DPPS module 1522 may include a database, which may include the authentication data required for establishing a connection between an application client and an application server [00344]
- DDPS module 1522 may provide encryption/decryption functionality, thus enabling DDP 1536 to security fo ⁇ applications that may require the functionality
- an important e-mail from application client 1508 is routed from an email server to an email application client on the handset
- DDPS module 1522 may encrypt the DDP data packets before sending the packets to the coitesponding application server
- an instant message between two IM clients may be sent in a non-secure manner.
- DDP 1536 may route the instant message without employing the DDPS module 1522 to encrypt the data packets sent between the ⁇
- DDP 1536 may include priority message scheduler module 1518, which may be configured to schedule and queue data packets
- priority message scheduler module 1518 may be responsible for managing the plurality of different data packets that may be serviced by DDP 1536.
- priority message scheduler module 1 518 may establish a policy for handling the incoming and outgoing data packets
- priority message scheduler module 151 S may have different priority levels depending upon the originating application, In an example, application A (e g., email) may have no requirement for teal -time delivery of its data packets. However, application B (e g , Presence Management) may be sensitive to time delay and require realtime delivery of the data packets.
- priority message scheduler module 1 518 may be an optional DDP module hi an example, if DDP 1536 is currently only handling data traffic for one application, then DDP 1536 may not have to employ priority message scheduler- module 15 I S to handle the scheduling of the data packets
- DDP 1536 may include a reliable module (RDDP 1516), which may provide a level of assurance for the delivery of the plurality of data packets.
- RDDP 1516 has mechanism to retransmit packets that do not successfully reach their destination within a specified time inten al in an embodiment, if a data packet is not received within a preset time interval, the packet will be retransmitted. . The packet may be retransmitted a specified number of times before notifying the application that the transfer of the packet has failed.
- DDP i 536 may provide assurance that data packets are being sent and/or received in the order in which the application requires.
- DDP 1536 may include a DDX module 1514, which may be employed to transport large amounts of data (e.g. image files, log files, etc. ) between the mobility client and the mobility server,
- DDX module i 514 includes mechanisms to ensure the data integrity of the data transfers between the mobility client and mobility server,
- DDX module 1514 may include mechanisms for confirming completion of the data transfer to the applications.
- DDP 1 536 may be implemented for a plurality of applications including, but are not limited to, voice mobility control application 1506, device management application 1504. project management application 1502, voicemail/email transfer application ! 508, device image management application 1510, instant messaging application 1512. and the Si ke In an embodiment of the plurality of applications may be divided into two groups
- the plurality of applications are applications that may tend to send larger tiles, thus DDP 1536 may ernpl ⁇ > DDX module i 514 to convert the tiles into smaller data packets that can utilize any of flic other modules within DDP 1536, including 1516, 1518, 1522, and provide assuiance that the data file has been successfully transmitted and that the application has been notified of the completed transfer
- ⁇ oice mobility control 1506 may enable the mobility client and the mobility server to share mobility status, which may be sent in a single DDP packet
- Fig 16 A shows, in an embodiment, an example of Siow data within a mobility architectural arrangement with DDP may flow between an application client located within a client de ⁇ ice and an application sei vet , which is managed by an enterprise
- an application client located within a client de ⁇ ice
- an application sei vet which is managed by an enterprise
- server lt>04 may initiate a file transfer
- Voicemail server 1604 may send the file along a path 1650
- the mobility sen er may prepare the file to be sent through a secure channel to a mobility client on the client device
- a sen er DDX module 1608, w hich is within the mobility server, may be employed to convert the file into a format that is compatible with the control and transport protocol of the secure channel
- server DDX module 1o08 may convert the file, which may be in a binary format, into a format that can be transported over the SIP protocol ⁇ Uo
- serser DDX module 1608 may break the file into a plurality of data packets in order to ensure the effectiveness of routing the plurality of data packets through the secure channel
- server DDX module 1608 may send a first data packet to a server DDP 1616
- Server DDP 1616 in an embodiment, may include a server RDDP 1614, which may provide a level of assurance for the delivery of the first data packet.
- server DDP 1616 may include a DDPS module, which may encrypt the data packets as required by the application.
- simple data packets e.g., instant messages
- important data packets e.g., a confidential email
- the first data packet may be encapsulated as a SLP notify message (as shown in a code example .»70 of Fig. !6B) and sent via the secure channel through a network 1624 to the client device.
- the first data packet may be sent through the secure channel by using a server SIP control protocol 1620 and a server UOP transport protocol 1622.
- the first data packet may be received securely by the mobility client of the cliem device, which may receive data packets through a client UDP transport protocol 1626 and a client SIP control protocol 1628.
- a client DDP 1632 may receive the first data packet.
- a client R DDP 1634 may perform a similar check as that performed by server RDDP 1614.
- client RDDI* 1634 may send a SlP Notify Message with a DDP acknowledgment along a path 1652 through the secure channel to server DDX module 1608.
- client RDDP 1634 may send an assurance from the mobility client to the mobility server thai, data packet has been received.
- server RDDP module 1614 does not receive the RDDP acknowledgement server RDDP module 1614 will retransmit the data packet until the packet has been successfully acknowledged or the maximum number of retries is exhausted.
- a data packet may be sent and the next data packet may not be sent until a DDP acknowledgement has been received,
- server DDX module 1608 may not send a second data packet until a DDP acknowledgement has been received
- a fixed number of data packets may be sent and the sending of additional packets would not occur until an acknowledgement is received for one or more of the initial data packets
- server DDX module 1608 may send a group of 10 data packets and will be required to wait until at least one acknowledgment is received before it is allowed to transmit an additional data packet.
- the data packet wili be routed to a client DDX module 1636.
- client DDX module 1636 may hold the data packets until all data packets have been received.
- server DDX module 1608 may send a message indicating that each of the data packets for the requested file has been sent and that no additional data packet for the file will be forthcoming. Once all of the data packets have been received, then client DDX module S 636 will reassemble the file and notify the voicemail client 1602 that the voicemail file is available
- the architecture of the DDP may provide a single secure channel from which a plurality of application clients may interact with a plurality of application servers
- the architecture of the DDP may provide control by assuring that the data packets are being received, that proper verification has been done in order to acknowledge that all data packets have been received, and that there are no missing data packets ⁇ n an example, the architecture of the DDP may enable large tiles to be broken up into smaller data packets, which may be sent with the assurance that the acknowledgement may be sent by the receiving side
- Fig 17 shows, in an embodiment of the invention, an example of a call flow illustrating how a secure channel may be established between a client device and a mobility server.
- a SiP registration may occur.
- a client SlP 1716 may send a SIP registration request through a client UDP 1714
- the SIP registration request may be received by a server SlP 1710 through a server L 1 DP 1712
- server SIP 1710 may send a SlP registration response 1726 via server CJDP 1712 and client UDP 1 714 to client SlP 1716.
- a client DDPS module 1718 a module of a client DDP 1720, will send a DDPS session request to a server DDPS module 1708.
- the DDPS session request may be routed through client SIP 1716, client UDP 1714, server UDP 1712, server SIP 1710 to server DDPS module 1708.
- server DDPS module 1708 Upon receiving the DDPS session request, at a next step 1730, server DDPS module 1708 will send a DDPS session response 1730 to client DDPS module 171 S via server SiP 1710, server UDP 1 712, diem UDP 1714, and client SIP 1716.
- client DDPS 1718 may forward the DDFS session response to an application client 1722.
- application client 1722 may send a DDP registration request to a user/device manager 1704 In an example, application client 1722 may send the registration information to a client DDP 1720.
- Client DDP 1720 may send the registration information through the established secure channel (i e.. through client DDPS module 1718, client SlP 1716. client UDP 1 714, server UDP 1712, server SSP 17 SO, and server DDPS module 1708) to a DDP 1706, which may then route the registration information to user/device manager 1704.
- the established secure channel i e.. through client DDPS module 1718, client SlP 1716.
- user device manager 1704 may send a DDP registration response to application client 1732, at a next step 1734.
- user device manager S 704 may send the DDP registration response to server DDP 1706
- Server DDP 1706 may send the registration information through the established secure channel (i.e . through server DDPS 1708, server StP 1710, server UDP 1712, client UDP 1714, client SlP 1716, and client DDPS 1718) to DDP 1720, which may then route the DDP registration response to the user of application client 1722.
- registration may be a one-time event.
- client device will register with the mobility server when the client device is initialized for the first time Since a secure channel has already been established at steps 428 and 430, the user of the client device may be assured that the sensitive DDP registration information is being sent encrypted and through a secure channel, hi an embodiment, n ⁇ additional DDP registration may need to occur as long as the secure channel between the client device and the mobility server is maintained.
- interaction between application clients on a client device and application servers managed by an enterprise may now be conducted securely through a single secure channel
- Fig. 18 and 19 show, in an embodiment, examples of how DDP may handle interaction between applications clients on a client device and application servers managed by an enterprise.
- Fig. 18 shows, in an embodiment, a simple call Slow illustrating a situation in which a large file may have to be sent
- an application client 1814 may send a request 1816 for software upgrade to an image manager 1802, which may be responsible for managing the different software images on the server side.
- application client 1814 may send a new image request to image manager J 802.
- the new Image request may first be sent from client application 1814 to a client DDF 1810
- DDP 1810 may send the request through a secure channel to a server DDP 1808.
- the new image request Before being sent to image manager 1802, the new image request ma)' be routed to a device/user manager 1804, which may be responsible for determining which software may need to be upgraded. After device user/manager 1804 has determined which software upgrades the client device may need, device user/manager 1804 may route the new image request to image manager 1802. [00371] Upon receiving the request, the image manager !802 may then send the requested software upgrade (e.g., requested data 1820) to a server DDX module 1806, In an embodiment, server DDX module 1806 may convert the file into a format thai is capable of being sent through the secure channel established between the client device and the mobility server. In an embodiment, server DDX module 1806 will break the large file into a plurality of data packets in order to transport the file through the secure channel.
- server DDX module 1806 will break the large file into a plurality of data packets in order to transport the file through the secure channel.
- server DDX module 1806 may send a DDX file transfer start to a client DDX module 1812 via server DDP 1808 and client DDP 1810
- a DDX file transfer start refers to a notification between a server DDX and a client DDX that a file is about to be sent.
- the DDX file transfer start may include basic information about the incoming file such as, for example, name of the file, file size, number of data packets that may be sent, the application that is requesting for the file, and the like.
- client DDP 1810 may send a DDX start response to sen, er DDX 1806
- a.n RDDP module within the DDP may be sending the DDX start response.
- server DDX module 1806 may send a first DDX data packet to client DDX module 1812.
- the DDX data message may first be sent to server DDP 1808
- the DDX data message will be encapsulated as a SIP notify message, in an embodiment, and sent through the secure channel over a SlP control protocol and a UDf* transport protocol.
- the DDX data message may be received by a client DDP 1810, which may then route the DDX data message to client DDX module 1812.
- a DDP acknowledgement will be sent by client DDP 1810.
- the RDDP module within client DDP 1810 will send the DDP acknowledgement to inform server DDX module 1806 that the incoming DDX data message has been received successfully.
- Steps 1826 and 1828 may be iterative steps that may be repeated until all DDX data packets and acknowledgements have been exchanged between the server and client DDX module.
- server DDX module 1806 will send a DDX file transfer end, at a next step 1830, to application client 1814 to notify the application client that all DDX data messages have been sent.
- the DDX file transfer end may be sent from server DDX module 1806 to server DDP
- the DDX file transfer end may be received by client DDP 1810,
- the RDDP of client DDP I S iO may send a DDP acknowledgement to image manager 1802, at a next step 1832.
- client DDP 1810 may route the DDX file transfer end to client DDX module 1812, which will notify the application client 1814.
- a new secure channel may not have to be established in order to request the software upgrade. Instead, the request for a software upgrade may be received and handled by the application server without having to establish a new secure channel.
- Fig. 18 shows how the architecture of the DDP may be employed to send data traffic in a secure and reliable manner (hat may enable the sender and the requestor the assurance that all data packets for a requested tile have been successfully received.
- Fig. 19 shows, in an embodiment of the invention, a simple call flow illustrating a situation in which small control messages, such as those sent by control applications, may be sent.
- the interaction between an application client and an application server may occur without a DDX module.
- a client presence manager 1910 on a client device may send a presence preference setting to a server presence manager 1902.
- client presence manager 1910 may send a presence preference setting (as a single DDP data packet) to a client
- DDP 1908 which may then send the presence preference setting through a secure channel to a server DDP 1906.
- server DDP 1906 may send a DDP acknowledgement, at a next step 1918.
- a RDDP module within the DDP may send a DDP acknowledgement, at a next step 1918.
- server DDP 1906 will notify the server presence manager 1902 of the presence preference setting through the device/user manager 1904.
- client presence manager I Q IO may send a presence query i c >20 to client DDP 1908, which may send the presence query through the established secure channel to server DDP 1906, Upon receiving the presence query, server DDP 1906 will forward the query through device/user manager 1904 to server presence manager 1902, which may perform the requested query to retrieve the requested information.
- server presence manager 1902 may send a presence response (e.g., requested status data) to client presence manager 1910.
- a presence response e.g., requested status data
- the presence response may be sent from server presence manager 1902 through device/user manager 1904 to server DDP 1906. Then, the presence response may be sent through the secure channel to client DDP 1908, which may then route the presence response to client presence manager 1910.
- Fig. 18 and 19 show different examples of how DD? may be employed to manage the interaction between a plurality of data applications on a client device and a plurality of application servers managed by an enterprise.
- a mobility architectural arrangement with DDP establishes a single channel from which each of the application clients and the application servers may interact with one another.
- the architecture of DDP may he employed to send data traffic in a secure and reliable manner that may enable the sender and the requestor the assurance that all data packets for a requested file have been successfully received.
- Fig. 18 shows how DDP may be employed in managing the user ' s experience on the client device including, but are not limited to, software upgrade, device configuration, and user information management.
- the DDP may manage a user's presence (as seen in Fig 19 ⁇ by allowing the user to share his status, thus enabling the system to manage incoming traffic and to allow others to see his or her status.
- DDP may manage mobility by allowing the user to roam from one data network to another without having to worn' about session management.
- a mobility architectural arrangement with DDP reduces the security risk by providing a single secure channel from which multiple applications on a client device may be able to communicate with a plurality of applications on an enterprise server.
- DDP is a versatile protocol that may be advantageously implemented independent of hardware and/or software limitations.
- DDP is an adaptable protocol that may be manipulated to take advantage of a plurality of control and/or transport protocols.
- a method which is fabricated in accordance with one or more embodiment of the present invention, allows the handset based enterprise applications to make use of existing VoIP related connection in a secure manner
- This invention is implemented by devising a distributed protocol proxy.
- the distributed protocol proxy may be divided into two parts. One part resides on the mobile handset along with the VoIP client The other part resides inside the enterprise along with the VoIP server.
- the handset based VoIP client acts as a server for the different applications running on the handset.
- This component makes use of existing VoIP related connection (e g. SIP) to send the application pay load across to the enterprise.
- the server side proxy component is responsible for stripping the payload and making connection to the actual enterprise servers.
- the client and server side proxy components may further be subdivided into multiple subcomponents. Each subcomponent shall be responsible for proxying one protocol.
- Fig. 7A shows a network architecture in accordance with one or more embodiments of the present invention and includes two network interfaces per host. Two paths are provided through the independent networks, one from interface CO to iSO and another from C 1 to S S In SCTP, these two paths would be collected into an association. [003%] Di vitas "Thin Client" monitors the paths of the association using a built-in heartbeat; upon detecting a path failure, the protocol sends traffic over the alternate path. It may not be necessary for the applications to know that a failover recovery occurred.
- Fail over can also be used to maintain network application connectivity
- a laptop that includes * a wireless 802 11 interface and an Ethernet interface
- the higher-speed bthernet interface would be preferred, but upon loss of connection (remov al from the docking station), connections would be failed over to the wireless interface
- the Hihemet connection would be detected and communication resumed over this interface
- a multi -homed host is one that has more than one network interface and therefore more than one IP address fot which the multi-homed host can be addressed In TCP.
- a connection refers to a channel between two endpoints (in this case, a socket between the interfaces of two hosts)
- Figs 7B-D show how a thin client along with a counterpart of the thin client on the server has in affect created an efficient transport mechanism for conveying state information between handset and the server in accordance with one or mom embodiments of the present invention
- e-mail application i e , SMTP
- SIP - NOTIFY method uses the SIP - NOTIFY method to tunnel application layei packets without ⁇ he knowledge of the SMTP application
- Fig 20 is a prior art example of an architectural arrangement in which each application on a handset is connected individually to a corresponding application server within an enterprise
- a handset 2000 may include a plurality of application clients including, but are not limited to, a Di Vitas client 2002, a CRM (customei relationship management) application client 2006, and a mail application client 2008
- the application clients may be independent of one another or may interact with one another via application protocol interfaces (APIs)
- APIs application protocol interfaces
- application clients 2006 and 2008 may be interacting with DiVi ta_ « client 2002 via an API 2010 and an API 2012, R e spectively
- the application clients in handset 2000 may interact with application servers within an enterprise 2090.
- Enterprise 20 ⁇ 0 may include a plurality of application servers including, but are not limited to, a Di Vitas server 2022, a CRM application server 2026. and a mail application server 2028.
- the application servers may be independent of one another or may interact with one another via APIs
- application servers 2026 and 2028 may be interacting with Di Vitas server 2022 via an API 2030 and an API 2032, respectively.
- the purpose of the APIs is to enable the application to interact with one another
- the interaction via the APIs is optional [00404]
- a stockbroker on handset 2000 may be communicating with his client via Di Vitas client 2002. While conversing with his client, the stockbroker may want to have his client's portfolio readily available, hi this example, the stockbroker may have to establish two different sessions.
- the stockbroker may establish a first session to enable him to converse with his client via Di Vitas client 2002 To bring up the portfolio, the stockbroker may establish a second session by employing (! ' RM application client 2006 to interact with CRM application server 2026, which is located behind a firewall 2040 within an enterprise 2090
- SSL VPN secure sockets layer
- VPN virtual private network
- IP Security Gateway may be employed instead of an SSL.
- IP Security VPN Internet Protocol
- one or more application clients on. a handset may interact with application servers via one secure channel by traversing through an IP Security Client 2014 and an IP Security Gateway 2030.
- authentication data e.g., user name, password, etc.
- the user may also be burdened with the responsibility of authenticating each time a different application client is utilized.
- each application client may be indi ⁇ iduaiiv configured to communicate with its corresponding application server via a different IP address
- CRM application client 2006 wants to interact with application server 2026 If a secure channel 2084 has not been established, then the user may ha ⁇ c to first provide authentication data Once .secure channel 2084 has been established, the ut>er may then have to provide additional authentication data in order to enable CRM application client 2006 to interact with CRM application scivci 2026
- a new secure channel and re-authentication mav ha ⁇ e to occur each time a session is dropped In an example, if a user i& mobile while in a session, the user ma> encounter a risk of being accidentally dropped from a session if the connection is lost hor example, a user, connected via a Wi-Fi network, may traverse outside of the Wi-Fi network
- the session may be dropped and the user may e to establish another session, such as a cellular connection, for example ⁇ s a result, the usci may become burdened with the inconvenience of establishing a new session and also may become frustrated with the limited mobility
- Tn show how an application client may interact with an application server, prior art
- Fig 21 is provided Fig 21 is a prior art flow chart illustrating the method for enabling an application client to communicate with an application server in an IP Security VPN environment Hg 2] is discussed in relation to Hg 20
- email data traffic is sent to the application server
- mail application client 2008 may send email data packets to mail application server
- IP Security Client 2014 may analyze each packet to deteimine if the packet is intended foi enterprise 2090 IP Security Client 2014 may identify the recipient of the packet by analyzing the IP address and the port number that is located within the packet
- IP Security Client 2014 may eithei
- IP Security Client 2014 determines that the data traffic is intended for an application server that is located within enterprise 2090, then at a next step 2108, IP Security
- Client 2014 may encrypt each data packet before forwarding the data packet
- the piocess of encryption each data packet may require handset 2000 to have sufficient CPt r processing power Further, the requirement that each data packet he encrypted in an IP Secuiity VPK environment may cause iatencv issue in a voice communication situation, such as a Voice over
- VoIP Voice over IP
- IP Security Client 2014 ma> then send the encr ⁇ pted traffic to the intended application SCTVCJ along secuic channel 2084
- a secure channel has to be created each time a new application is being employed
- Security Client 2014 may send the encrypted traffic through network 2050 and firewall 2040 to
- IP Security Gateway 2030 may perform a check to determine how to route the traffic Similar to IP Security Client 2014, IP Security Gateway 2030 may analyze each packet to determine if the packet is intended for enterprise 2090
- IP Security Gateway 2030 may drop the packet
- iP Security Gateway 2030 may decrypt the traffic
- IP Security Gateway 2030 may then analyze the packet to identify the IP address and port number of the reeeh ing application server ⁇ t a next step 2 J 18, LP Security Gateway 2030 may forward the data packet to the appropriate application sener (e g , mail application server 2028)
- application sener e g , mail application server 2028
- steps 2102 through 2118 is a continual process and may be performed for each packet that is being Ssc- ⁇ t by an application client
- the inventors herein realized that the prior art architectural arrangement of multiple authentications and/or multiple secure channels may be consolidated to create a single sign-on environment
- a mob ⁇ it ⁇ architectural anangeraent is presided by implementing a Di Vitas protocol proxy (J)PP)
- the DPP mas include a client DPP and a server DPP
- the handset may include a mobility client (e g , DiVitas client), which may include a client DPP to manage the connectivity between the handset and the mobility server (e g , Di Vitas server)
- the mobility server may include a server DPP to manage the connectivity between the mobility server and the handset
- the client and server DPP may include a plurality of sub-dient/server DPPs for managing different types of protocols (e g , SlP, SMTP, etc )
- a DPP enables the establishment of a single secure channel from which each application client may interact with its corresponding application server Since each application is routing its data traffic through a common DPP, the DPP mav now manage connectivity between the handset and the mobility server Connectivity infoimation may include establishing a secure channel between the handset and
- Connectivity information may be employed to determine when and how to connect the handset
- connectivity information may also include when to perform a handoff from one network to another network Ce g , from a Wi-FI network to a cellular network), thereby enabling a seamless transition between different networks
- Fig 22 sh ⁇ us in an embodiment of the im ention, a simple block diagram of a mobility architccluia! a ⁇ angement
- a handset 2202 is interacting with a DiVitas server 2218 (e g , mobility seryer) within an enterprise 221t>
- Handset 2202 may include a Di Vitas client 2204 Ce g . mobility client) and a plurality of application clients «2206 and 2208)
- Di Vitas client 2204 may include a client DPP to manage the connectivity between the handset and the mobility sen er
- application client 2206 and application client 2208 arc not configured to directly interact with their corresponding application servers (2220 and 2222) Instead, the various different configurations for each of the application clients ma> be simplified, in an embodiment, to direct ail data ⁇ raffle to a single local IP host 2210 (e g though IP addtess of 127 0 0 J ) that is associated with Di Vitas client 2204
- a single local IP host 2210 e g though IP addtess of 127 0 0 J
- data traffic from application clients 2206 and 2208 may now be configured to be routed to Di Vitas client 2204 via APIs 2212 and 2214 From Di Vitas client 2204, all data traffic may then be routed through DiVitas server 2218 within enterprise 22Ui via a network 2224 (e g , internet) In an embodiment of the invention.
- DiVitas server 2218 may include a ⁇ ener DPP to manage the eonneetk ity between the handset and the mobility server Once DiVitas server 2218 has received the data traffic, DiVitas server 2218 may then route the traffic appropriately to the corresponding application server (2220 and 2222 ⁇ via an API (2232 and 2234) [00430]
- a user of handset 2202 wants to send an email by employing application client 2206.
- DDX DiVitas Data Exchange
- the DDX add a new tag which add information about the application client that U sending the data traffic.
- the encapsulated data packet may now be forwarded along a secure channel 2250, which include traversing through network 2224 to be received by Di Vitas server 2218. Note that, if the enterprise is protected by one or more security modules (e.g , firewall 2226), then the data packet may also have to traverse through one or more security modules.
- security modules e.g , firewall 2226
- Di Vitas server 2218 may employ the DDX tag to retrieve the location of the application server.
- the DDX tag may include an identitlcation number (e.g., MAC address, port address), may indicate which application server (e g , application server 2220) within the enterprise is the intended recipient of the data packet.
- a mobility architectural arrangement may manage the connectivity between the handset and the mobility server
- the mobility architectural arrangement may employ a control protocol that is common! ⁇ - utilized by a handset, such as SIP for example,
- the user may only have to perform the manual authentication once in order to establish the secure channel.
- another secure channel does not have to be established each time an application client (2206 and 2208) wants to interact with an application server (2220 and 2222).
- the mobility architectural arrangement may also include a database, which may include authentication data for each application client.
- the mobility architectural arrangement may utilizes the authentication data that is specific to the application, which may be stored in the database, to automatically authenticate the user From the perspective of the user, the mobility architectural arrangement is essentially a single sign-on environment.
- the mobility architectural arrangement substantially streamlines the time and effort a network administrator may have to spend in configuring each application client.
- the network administrator may be able to substantially reduce the time and cost associated with managing security
- the mobility architectural arrangement may be implemented as a rich or thin client
- Fig 23 shows, m an embodiment of the invention, a block diagram illustrating the mobility architectural arrangement as a rich client
- a rich client refers to a mobility architectural arrangement in which the client DPP and server DPP not only manage the various different applications but may also pun ide .support foi at least one or more application client functionality ⁇ e g , a voice application client an instant messaging application client, email application client, etc )
- a user of a handset 2302 wants to employ a mail application client 2310 (e g , Microsoft® Outlook, etc ) to retrieve an e-mail from a mail application server 2326 (e g , Microsoft® Server, etc ) that is located within an enterprise 23 I 8 Fig 23 will be discussed in conjunction with Fig 24 Fig 24 shows, in an embodiment of the im ention, a simple Oow chart illustrating an example of a method for employing a mobility architectural arrangement
- application client may send data traffic to a focal host of a Di Vitas client
- application client 2310 has been configured to route its data traffic through a local host 2308, which is located within a Di Vitas client 2304
- application client 2310 may send an SM I P (simple mail transfer protocol ) data packet 2312 over TCP-IP to DiVitas client 2304
- SMTP data packet 2312 may be received by an SMTP proxy client 2306 (e g , sub-client DPP), which is located at DiVitas client 2304
- a client DPP may include a plurality of sub-client DPPs fhe type of proxy client that may be employed to handle the data traffic niay depend upon the type of application client
- the data packet may include a port number, which is unique to an application client
- SMTP data packet 23 12 includes the following data 127 0 0 1/25 in this example, the nurabei 127 0 0 1 is an IP address, which is specific to local host 2308 and the number 25 refers to a port number, which in this example is associated with SMTP pioxy client 2306
- the data traffic mav be encapsulated as a SIP Notify Message with a DDX tag
- DiVitas client 2304 may
- SIP data packet 2330 may include the original data packet (e g .
- the DDX header may include a unique identification number that is unique to an application sen ei
- the unique identification number may be generated based on the port number that was included in the SVtTP data packet
- an additional tag may be included in the formatted data packet to identify how the formatted data packet may be transported
- transport protocol tag 233Oc ma> be a UDP-IP transport tag
- the DDX part is encrypted even if the rest of the data packet is not
- the Di Vitas client may send the data packet to the Di Vitas server
- SlP data packet 2330 may be sent via a secure channel 23SO through a network 23 14 and/or a firewall 2316 to a Di Vitas server 2320
- the DiVitas server may check to determine if the incoming data packet is a SlP Notify Message If the incoming data packet is not a Sip Notifv Message, then at a next step 2410, the data packet may be dropped
- the Di Vitas server may identify the intended proxy server by checking the DDX tag In an embodiment, the DiVitas server may have to decrypt the DDX packet in order to read the information stored in the DDX packet In an example, based on the unique identification number in the DDX tag, Di Vitas server 2320 knows to route data packet 2330 to SM TP proxy server 2322 In an embodiment of the invention, a server DPP may include a plurality of sub- server DPPs in an embodiment of the invention, the type of proxy server that may handle the incoming traffic may depend upon the type of data traffic
- the data packet may be Orientd to the ptoxy server Since SIP data packet 2330 is an SVlTP data packet, formatted data packet is handled by SMTP proxy server 2322 ⁇ e g , sub-server DPP), which is located inside DiVitas burvar 2320 [00448]
- the data packet is routed to the intended application server In an embodiment of the invention, SMTP pioxv serx er 2322 may conx eri SIP data packet 2330
- SIP data packet 2330 may be converted from a SiP notify message into an SMTP data packet 2328.
- the DDX part may be dropped.
- the transport protocol may be changed from UDP-IP to TCP-IP, which may be better employed to deploy email data traffic to the respective application server (e.g., maii application server 2326 ⁇ via API 2332.
- the method steps described in Fig 24 does not show the encryption and/or decryption of a data packet.
- the data packet may be sent without being encrypted.
- the requirement for encryption may be- optional and may depend upon the user's requirement.
- part or the entire data packet may be encrypted.
- the DDX part may be encrypted but the rest of the data packet may remain unencrypted
- the optional encryption enables less processing power to be utilized and a decrease in latency that is usually associated with encrypted data packets.
- the rich mobility architectural arrangement may act as a mobility manager enabling application clients of a handset to interact with application servers within a single sign-on environment. Further, the rich mobility architectural arrangement may include functionality for converting data packets from a variety of applications into data packets that are capable of being transported by the control protocol and transport protocol that is specific to the secure channel that has been established [00451]
- the mobility architectural arrangement may be implemented as a thin client, as shown in Fig 25.
- the client DPP and the server DPP may be employed only as mobility managers (e.g., manage the connectivity for the applications) and may not provide support for at least one or more application functionalities
- a user of a handset 2500 wants to call a friend.
- the user may employ a telephone application client 2508 (e.g.. VoIP, etc.) to make his telephone call.
- a secure channel 2550 has already been established between a Di Vitas client 2502 and a Di Vitas server 2518, which is located within enterprise 2530.
- telephone application client 2508 may send a data packet 2512 (e.g., S1P/UD-IP) to a local host 2510 within Di Vitas client 2502.
- a data packet 2512 e.g., S1P/UD-IP
- a plurality of proxy clients may reside within Di Vitas client 2502 to support the various different application clients.
- a SIP proxy client 2504 may be located within DiVitas client 2502 to handle data packets from telephone application client 2508
- SlP prow client 2504 may analyze the data packet to determine how to route the packet
- the data packet that may be sent to a DiYitas client may include; a port number (c g , ⁇ 0o0, etc ) that ma) be unique to an application server
- DiVitas client 2502 may route data packet 25 12 through network 2514 and firewall 2528 to DiVitas server 2518 in an embodiment, a data packet does not have to be com cited if the data packet is already in a format that is routable bv a Di ⁇ ' itas client
- data packet 2512 is in a SIP, L ' DP-IP format, which is the format that DiYitas client 2502 may employ to route its data traffic
- a plurality of proxy setvet may teside within a DiVitas server
- a SlP prow setset 2532 may reside within DiYitas server 2518 to manage the incoming data traffic from telephone application client 2 ⁇ 08 Since data packel 2512 has been sent from telephone application client 2508, the data packet is handled SIP proxy server 2 ⁇ M
- SlP proxy seivei 25 >2 may forward data packet 2512 along a path 2522 to a destination telecommunication device (e g , telephone, etc ) via a telephone gatew ay 2520 (e g , PSTN.
- the other data packets 2530 (e g , RTP data packets, etc ) that may be sent by telephone application client may be sent along path 2560 through secure channel 25 ⁇ 0 to DiYitas server 25 S 8 without having to go through DiVitas client 2502
- the purpose of establishing a telecommunication session with the aid of a DiVitas client is to enable the application client to take advantage of the mobility functionality of the DiYitas client
- a control center has been established between the DiYitas client and the DiYitas sener to monitor the connectivity of the application client
- the DiVitas client and the DiVitas server may be able to share its connectivity status and be able to seamlessly handle roaming when the situation arises
- a thin mobility architectural arrangement may he implemented by an enterprise that may have already invested a large sum of money into a plurality of application and may only need a mobility manager.
- the enterprise may be able to take advantage of the mobility manager capability of the mobility architectural arrangement without having to restructure its telecommunication infrastructure,
- the mobility architectural arrangement with DPP provides a mobility manager capable of streamlining the telecommunication infrastructure,
- the mobility architectural arrangement provides a single sign-on environment,
- the same functionality may be achieved with a single secure channel.
- the cost and effort of managing the telecommunication infrastructure may be substantially reduced.
- the mobility architectural arrangement enables connectivity to be monitored and seamlessly handled without negatively impacting the user's telecommunication experience.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Cable Transmission Systems, Equalization Of Radio And Reduction Of Echo (AREA)
Abstract
An apparatus for canceling a signal is disclosed. The apparatus may include an identification code (ID code) generator configured to generate an ID code. The apparatus may also include an ID code injector configured to inject the ID code into at least one of the signal and a processed signal to produce a convolved signal. The processed signal is resulted from a processing of the signal. The apparatus may further include an ID code detector configured to detect at least one of the convolved signal, a transformed signal, and a transformation of the convolved signal. The transformed signal is resulted from the transformation of the convolved signal. The apparatus may further include an arithmetic function configured to remove at least one of the convolved signal and the transformed signal.
Description
CODE-BASED ECHO CANCELLATION
BACKGROUND
[0001 ] Conventional raobi Ie communication platforms include cellular Communications, for example. Global Systems for Mobile (GSM) Communications. Other conventional platforms that support limited mobility include WiFi, which is based on IEEE 802 1 1 standards. Cellular and WiFi are both well -known and established wireless communication platforms
[0002] Next generation platforms may he designed to permit mobile users to move between cellular and WiFi networks and include an Unlicensed Mobile Access (UMA) standard that may provide a switch controller for carriers to permit users to transcend between cellular and WiFi networks and vice-versa However, the UMA standard may have disadvantages including that carriers generally control calls and decide if and when to switch users between networks.
[0003 J An advanced mobile communication platform may be needed to provide enterprise level communication and control over users and the networks such that enterprises (instead of carriers) may select networks and/or control calls based on enterprise driven criteria rather than carrier driven criteria.
[0004J Further, in mobile/wireless communication, generally there have been the following problems: (a) echo; (b) packet delay, packet delay variation (packet jitter), and packet loss which affect quality of service (QoS); (c) hardware or software platform dependency of protocols; and (d) security of enterprise resource access. The problems are described as follows: [0005J (a) Echo
[0006] In voice Communications such as conventional PSTN, conference phone, cellular mobile phone, and voice over IP, echo cancellation (EC) technology has been widely used to improve quality of service (QoS) for end-users. Generally there are two types of echo canceller One types of echo canceller is generally called line or network echo canceller (LEC). LEC is generally used to remove electrical echoes caused by reflections of hybrid components on a network where 2-line and/or 4-line conversions take place. Another type of echo canceller is generally called acoustic echo canceller (AEC). AEC is generally used to remove acoustic echoes caused by acoustic sound feedbacks from a speaker to a microphone on a hand-free speakerphone, mobile phone, or conference phone Compared with LEC, implementing an AEC may be more challenging due to some of the following factors: longer echo tail since the sound speed is much slower than the light (or electron) speed, and
accordingly the echo canceller is required to have more processing power and more memory; more dynamic change of the acoustic echo characteristics because of movement of the phone or talker and changes in the environment, and accordingly the echo canceller may be required to track and catch up changes in the echo characteristics more quickly, and multiple echo paths due to multiple reflections from different objects with different distances and/or orientations. [0007] Current acoustic echo cancellation technologies generally have limitations. Acoustic echo cancellation technology may have been invented and used for at least 40 years so far. However, the basic approach to cancelling acoustic echoes may not have been significantly changed In general, a typical AEC utilizes an adaptive filter to model one or more echo path transfer functions and try to produce a replica of the echoes. The AEC may then subtract this replica from the near-end input signal to form a supposedly final echo-free fax-end signal output.
[0008 j Most of acoustic echo cancellation technology advancements so far are to employ different kinds of filters such as a Fill or HR filter, single band or multiple bands filter, or time-domain or frequency-domain filter. Further, different, algorithms such as IAIS, RLS, APA, and so on have been used to improve filter efficiency. Nevertheless, even with all these technology improvements, AEC design and implementation may still be a very challenging task today Conventional filters may show many limitations on handling the acoustic echoes because of the complexity and the variability nature of the acoustic echoes One of the limitations may be poor double-talk (both near-end and far-end speakers are talking) performance Calculations in the conventional filters may result in divergence instead of convergence between the echoes and the replica during a double-talk
[0009] (b) Packet delay, packet delay variation {packet jitter), and packet loss which affect quality of service (QoS)
[0010] In voice over IP and video over IP communications, voice and/or video media contents may need to be transferred from the transmitter to the receiver in real-time, while the underlying IP network was originally designed for noπ real-time date communications. Accordingly, providing and maintaining the quality of service (QoS) to the end-users may become a very challenging task The packet delay, the packet delay variation (packet jitter) and the packet loss from end-to-end may be considered three important QoS parameters which affect the quality and performance of the voice and video communications over IP network, [001 1] Current jitter buffer technologies tend to have limitations. A jitter buffer scheme which may also be called de-jitter buffer scheme is usually employed on the receiver side to
compensate or remove the network packet jitter. Basically, the scheme may not play out the packet as soon as the packet is received, instead, the scheme may queue up the incoming packets and play out the queued packets at even intervals. In effect, the packet queuing may represent inserting a delay before the play-out, happens. The inserted delay is usually called play-out delay.
[0012] There may be at least two issites on the current jitter buffer designs and implementations. The first issue may pertain to how much the play-out deϊay needs to be inserted. There may be a tradeoff on the amount of the play-out delay. For a large delay, there may be less packet loss. On the other hand, for a small delay, there may be a better interactive experience. The first issue may have been acceptably resolved by the adaptive jitter buffer scheme. In the adaptive jitter buffer scheme, a receiver may estimate the network packet jitter based on the timestamp of the RTP header of the incoming packets and the receiver local time. The receiver may then insert the minima! delay just enough to compensate the network packet jitter.
[0013] The second issue on the jitter buffer design may pertain to when to insert the play- out delay. Ideally, the play-out delay can be inserted at the beginning of each talk spurt. Accordingly, each talk spurt may he played out at even intervals, but only the silence periods between talk spurts are expanded or compressed. For example, if (he transmitter employs silence suppression technology, the packets coming in the receiver may ideally have gaps between talk spurts such that a device may be implemented to identify the beginning of {he each talk spurt based on the tiraestamp and the sequence number on the RTF headers of the incoming packets.
[0014] However, sn reality, inserting delays at talk spurt beginnings can be achieved only in limited situations. Most current silence suppression technologies may have limitations and may perform well only for some clean situations such as single human speaker or low background noise. Current silence suppression technologies may not perform well for some other situations such as multiple human speakers in a conference or high background noise such as during mobile Communications. Therefore, many applications may be executed without utilizing or activating silence suppression, in order to preserve better audio quality. As a result, the packets coming into the receiver may be continuous without any pauses. There may be no clue on the timestamp and the sequence number to tell if the packets represent silence or a talk spurt. Having no clue for identifying silence, the current jitter buffer technologies tend to perform poorly. One reason for the poor performance may be that the
current jitter buffer schemes generally look at only the RTP header information of the incoming packets, but not the content on the RT P pay load [0015] Cc) Hardware or software platform dependency of protocols: [00 ! 6] Hardware or software platform dependency may cause interoperability and/or configuration problems For interactive user sessions in communication which involve multimedia elements such as video, voice, chat, gaming, or virtual reality, there may be a need for a light weight protocol over a communication protocol such as, for example. Session Initiation Protocol (SlP) that can efficiently transport information between a server and a client and can work independently of hardware and software platforms, a control plane protocol in use between the server and the client, and an underlying transport layer or the medium over which the server and the client communicate There may he a need for a protocol that is fast enough to support critical real time control messages and is flexible enough for large- volume data transfer with minima! delay. However, prior-art, protocols such as UlViA are generally complex and difficult to establish interoperability.
[0017] (d) Security when enterprise resources are accessed from mobile devices [0018] More or more enterprises are allowing their employees to use their ceHular/mobiie phones for business purposes. With availability of high speed networks such as WiFi, Edge, UMTS, CT)MA RYDO1 etc to mobile phones, different vendors have been implementing VoIP (Voice over IP) for the mobile phones. Such implementations may require opening enterprise firewalls to allow VoIP related protocols, such as S! P, RTP, etc to operate [0019] In addition to VoI P, other enterprise data centric applications may also be extended to the mobile phones. The applications may include one or more of Presence/instant Messaging, Intranet web resources, CRM, Support database, etc If the clients for one or more the above applications on the mobile phones access the enterprise resources directly, enterprise firewalls may need to be opened for multiple protocols, and opening the enterprise firewalls may cause security problems
SUMMARY
[0020] The inv ention relates, in an embodiment, to an apparatus for canceling a signal. The apparatus includes an identification code (ID code) generator configured to generate an ID code The apparatus also includes an ID code injector configured to inject the ID code into at least one of the signal and a processed signal to produce a convolved signal The processed signal resulted from a processing of the signal The apparatus further includes an ID code detector configured to detect at least one of the convolved signal, a transformed signal, and a
transformation of the convolved signal. The transformed signal resulted from the transformation of the convolved signal The apparatus yet also includes an arithmetic function configured to remove at least one of the convolved signal and the transformed signal. [002 ! ] The above summary relates to only one or more of the many embodiments of the invention disclosed herein and is not intended to limit the scope of the invention, which is set forth in the claims herein. These and other features of the present invention will be described in more detail below in the detailed description of the invention and in conjunction with the following figures.
DESCRIPTION OF THE DRAWINGS
[0022] The present invention is i ilustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
[0023 j Fig 1 depicts a system network according to one or more embodiments of the present invention.
[0024] Tigs. 2A-C depict a mobility server according to one or more embodiments of the present invention.
[0025] Fig 3 depicts a mobile equipment client according one or more embodiments of the present invention.
[0026] Ftg. 4 depicts a block diagram of a codec based echo canceller in accordance with one or more embodiments of the present invention.
[0027] Fig. 5 A depicts a voice jitter buffer scheme in accordance with one or more embodiments of the present invention
[0028] Fig. 5B depicts a video jitter buffer scheme in accordance with one or more embodiments of the present invention.
[0029] Fig. 6A depicts an overview of a DDP architecture in accordance with one or more embodiments of the present invention,
[0030] Fig. 6 B depicts a DDP message exchange in accordance with one or more embodiments of the present invention.
[003 J] Fig. 7A depicts a network architecture which includes two network interfaces per host and is fabricated in accordance with one or more embodiments of the present invention. [0032] Fig 7B depicts a network architecture in accordance with one or more embodiments of the present invention.
[0033] Fig. 7C depicts a network architecture in accordance with one or more embodiments of the present invention.
[0034] Fig. 7D depicts a network architecture in accordance with one or more embodiments of the present invention,
[0035J Fig 8A shows a block diagram of an example prior an communication device including a filter for echo cancellation.
[0036] Fig. SB shows a flowchart of an example prior art method utilized, for example, in the example prior art communication device shown in Fig. 8A, for cancelling echoes. [0037J Fig 9A shows, in accordance with one or more embodiments of the present invention, a block diagram of a communication device (or system or arrangement) that may cancel echoes without relying on a filter.
[0038] Fig. 0B shows, in accordance with one or more embodiments of the present invention, a block diagram of an ID code generator employed in the communication device for system or arrangement) shown in Fig. 9A.
[0039] Fig. 9C shows, in accordance with one or more embodiments of the present invention, a flowchart of a method for cancelling echoes, for example, in the communication device (or system or arrangement) shown in Fig. 9A.
[0040] Fig 1OA shows a block diagram of a first example prior art packet voice communication system (first prior art arrangement) with an adaptive jitter buffer scheme. [0041 ] Fig. 1 OB shows a flowchart of a transmitter-side process of a prior art jitter buffer scheme utilized, for example, in the first prior art arrangement shown in the example of Fig. 1OA.
[0042] Fig. 1OC shows a flowchart of a prior art delay calculation process. [0043] Fig. 1 OD shows a flowchart of a prior art packet play-out control process. [0044] Fig. 10E shows a schematic representation of received packet flow at a packet play- out control when a transmitter-side voice activity detector (VAD) is turned on. [0045] Fig. 1OF shows a schematic representation of received packet flow at the packet play -out control when the transmitter-side VAD is turned off.
[0046] Fig. 1 1 A shows a block diagram of a receiver-side device of a second prior art packet voice communication system (second prior art arrangement), which includes adaptive buffer overflow control.
[0047] Fig. 1 IB shows a flowchart of a silence detection process utilized, for example, in the receiver-side device shown in the example of Fig. 1 1 A.
[0048] Fig 11C shows a flowchart of a buffer overflow control process utilized, for example- in the receiver-side device shown in the example of Fig 1 1 A
[0049] Hg 12Λ shows, in accordance with one or more embodiments of the present invention, a block diagram of a reeeh cr-side device of a packet voice communication system with adaptive jitter handling
[0050] Fig 12B shows, in accordance with one or more embodiments of the present invention, a delay insertion control process utilized for adaptive jittei handling utilized, for example, in the receiver-side device shown in the example of Fig 12 A
[0051] Fig 13 shows, in accordance with one or more embodiments of the present invention, a block diagram of a recei\er-side device of a packet video communication system with adaptive jitter handling
[00521 Hg 14 show s a prior art example of a call flow for establishing a connection between an application client and an application server
[0053] Fig 15 shows, in an embodiment of the im ention, a simple architectural diagram of the DDP invention
[0054] Fig 16A shows, in an embodiment, an example of how data within a mobility architectural arrangement with DDP may flow between an application client located within a client device and an application server, which is managed b\ an enterprise
[0055] Ftg 16B shows, in an embodiment, a code example of an encapsulated SlP notify message
[0056] Hg I "7 shows, in an embodiment, an example of a call flow illustrating how a secure channel may be established betw een a client device and a mobility server In an embodiment, to establish a secure channel, registration may occur
[0057] Fig 18 shows, in an embodiment, a simple call flow illustrating a situation in which a large file may have to be sent
[0058] Fig 1 Q shows, in an embodiment of the im ention, a simple call flow illustrating a situation in which small control messages, such as those sent by control applications, may be sent
[0050J Fig 20 is a prioi ait example of an archUectuial aπangement in which each application on a handset is connected individually to a corresponding application server within an enterprise
[0060] Fig 21 is a prior art flow chart illustrating the method for enabling an application client to communicate with an application &eivei in an IP Security VTN environment
[0061] Fig. 22 shows, in an embodiment of the invention, a simple block diagram of a mobility architectural arrangement.
[0062] Fig. 23 shows, in an embodiment of the invention, a block diagram illustrating the mobility architectural arrangement as a rich client,
[0063 J Fig 24 shows, in an embodiment of the invention, a simple How chart illustrating an example of a method for employing a mobility architectural arrangement.
[0064] Fig. 25 shows, in an embodiment of the invention, a mobility architectural arrangement implemented as a thin client.
TABLE OF CONTENTS
A, Architecture
B Codec based Acoustic echo cancellation
C Content-based jitter buffer scheme for voice/video over IP communications
D. Di vitas Description Protocol (DDPj
E. Divitas Protocol Proxy (DPP) H Conclusion
DETAILED DESCRIPTION
[0065] The present invention will now be described in detail with reference to a few preferred embodiments thereof as illustrated in the accompanying drawings, in the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without some or all of these specific details In other instances, well known process steps and/or structures have not been described in detail in order to not unnecessarily obscure the present invention. The features and advantages of the present invention may be better understood with reference to the drawings and discussions that follow.
[0066] The invention may be described with reference to specific apparatus and embodiments. Those skilled in the art will recognize that the description is for illustration and to provide the best mode of practicing the invention. The description should not be construed to limit the scope of the invention. For example, while references are made to certain communication protocols, others are anticipated by the invention. For instance, while WiFi (IEEE 802 1 1 ) is described as a protocol for wireless communication, other protocols may be implemented in the invention. References made herein to Di Vitas server and mobility server
may be equivalent References made herein to Di Vitas client and mobile equipment may be equivalent
[0067] Various embodiments are described herein below, including methods and techniques It should be kept in mind that the invention might also cover an article of manufacture that includes a computer readable medium on which computer-readable instructions for carrying out embodiments of the inventive technique axe stored The computer loadable medium ma> include, foi example, semiconductor, magnetic, opto-magnetic, optical or other forms of computer readable medium for storing computer readable code Further, the invention ma> also cover appaiatus.es foi piaeticing embodiment of the invention Such apparatus may include circuits, dedicated and/or programmable, to carry out operations pertaining to embodiments of the invention Examples of such apparatus include a general purpose compute! and/or a dedicated computing device when appropriatel} programmed and may include a combination of a computer/computing device and dcdieatcd/piogrammablc circuits adapted for the various operations pertaining to embodiments of the invention [0068 j A Architecture
[0069] Fig I depicts a s
\stera network 100 according to an embodiment of the invention Mobile equipment (MF) 102 is prov ided that communicates with the network in a number of possible ways MF. 102 can communicate with a cellular network 1 10 that includes a Base Transceiver Station (BTS) I l 2, a BTS Switching Center (BSC) i 14 and Mobile Switching Center (MSC) 1 16 The MSC is coupled to a Media Gateway 120 that is coupled to a public switched telephone network (PSTN) 122 Other conventional public and private telephones 124 are also coupled to the PSTN A PBX 130 is coupled to the PSTN and serves an enterprise for purposes of making and receh inn calls, for example, via telephone I 36 Mobility server 150 is coupled to the PBX as well as other networks For example, mobility server i 50 is coupled via router 132 to an Internet Protocol Wide Area Network (W AN) 138 The mobi!it> server 150 is also coupled via router 140 and firewall 142 to the Internet 144 The mobility server is also coupled to a local area network (LAN) with wireless access point 160 One access point is depicted while the invention anticipates multiple access points as well The access point 160 permits a use? with MF 102 to wandei in the enterprise and stay connected to the PSTN through the mobility server J 50 and PBX 130 If the user wanders beyond the boundary of the LAN, the user will be connected to an alternate network (e g the cellular network) as descπbed below in detail Also depicted is an access point 180 that is coupled to the internet for access under certain conditions as described herein
[0070] Figs. 2A-C depict a mobility server according to an embodiment of the invention. [007 \ } Security Manager - The defmni on of security when two or more entities are communicating involves the following aspects:
1. Mutual Authentication of the communicating entities
2. Privacy of the communication channel
3. Integrity of messages exchanged 4 Authentication of messages
[0072] In DiVhas mobility solution there are three distinct communicating entities: DiVitas Client, DiVitas Server and external VoIP GW. And there are two distinct types of paths between these entities: SlP signaling path and Media path.
[0073 ] As described in the Architecture Specif] cat) onf 1 j the following mechanisms are used to achieve the above mentioned security aspects between client, server and external gateway for signaling and data paths:
1. SIP TLS session between client and server.
2. Client Authentication using SlP Notify after SIP TLS establishment
3. Authentication of users with server
4. SlP TLS session between server and external VoIP Gateway,
5. Server authentication with external VoIP Gateway
6. Secure media path
7. Derived requirements
[0074] User/Device Manager/Mobility Controller - The device and mobility Manager (hereby referred to as DMM) is a module that handles device configuration and status as well as the mobility aspects while there is an active call on a device. The following sections capture the functional and design specifications of the DMM along with the public interfaces that the DMM supports. [0075] Here is a summary of the roles and responsibilities of the DMM
1. Device configuration controlled by the enterprise administrator.
2. Report status of the device.
3. Image management for the device
4. Maintain and implement the mobility logic for handsets with an active call - i.e., handle WiFi to Cell and vice-versa handoff,
5, Handles device initialization and configuration requests from the client.
[0076] Control Plane/Call Control - CaIi control (CC) is the primary control plane module responsible for the following functions:
1. Voice over ΪP call processing
2. SlP proxy server and B2BUA
3. PSTN Call management through PSTN GWs
4. PBX feature management through Asterisk
5. Resource and Connection management
[0077] Call control module resides on the DN media switch. The call control module interfaces with the SIP stack, and Asterisk, (or any other) PBX module to provide the above mentioned functionality.
1. SlP stack {for UA, CCM, and Asterisk etc): SlP stack is mainly used as protocol message decode/encode engine. SlP stack also performs basic protocol specific tasks, like standards based message parsing and validation, retransmissions, proprietary message validation etc. For most of the proxy and B2BIJ A tasks, SIP stack relies on CC for decision-making. Interactions between CC and Asterisk as well as CC and CCM are through standards based SIP messages.
2. Proxy Agent/Configuration Manager (PA/CM). Proxy agent acts as a configuration manager for ail the applications. Call control related information is downloaded by PA at the time of provisioning or after the disk DB is read following a system bring up. CC stores the data in RAM for local/faster access, CC also updates PA of any dynamic information (e.g. call going active or down), or on demand information (e.g SNMP GET)
3. Resource Manager (RM): Resource manager provides logical map of the physical/network resources. These resources include GE port, DSP resources, sockets, U DP/TCP ports, etc. and may not include system resources like memory, buffer pool, timers, queues etc. The resources may not include sockets used for internal IPC communication. CC uses RM for resource CAC, resource reservation and commit. As part of the commit, RM talks to media switch to program hardware to enable media flow.
[007S] Media Switch Application (MSA) - The MSA will be designed to run partially on Linux and remaining on TMS320DM64x DSP processor. The application will perform the foS 1 owing functi ons ;
RTP packet processing.
Switching.
Transcoding.
Conferencing.
Adaptive jitter buffer
Packet loss concealment.
Post processing which includes VAD/CNG and AGC
[0079] The MSA software needs to support encoding /decoding of different speech codecs. The type of algorithm and channel can change during am time i.e., a design to support multichannel, multi-algorithm is needed. Each codec algorithm needs to be reentrant, and the program as well as data needs to be fully releasable. In order to support various codecs the following needs to taken into account' a. Since the DSP has limited on chip data memory not a! I data can be placed on -chip all the time in multi-channel, multi-algorithm application. This requires all data (context and tables) in each algorithm to be relocatable (between on /off chip memory) during context switching. This requires a need to find out the memory', stack size as well as
M 1"PS requirement for each supported codec. b. A mechanism to exchange messaging between host and DSP process indicating channel number as well as codec type along with any other features. The channel configuration manager needs to open a channel on DSP indicating type of functionality required. Periodic message indicating the state of DSP needs to be implemented.
[0080] The DSP processor allows the external host to access the DSP external memory. The DSP has 16K bytes of fust level program as well as data memory. The program as well as data memory share the second level memory of 256kbytes. The l&Mbytes of external memory (SDRAM) is available. The shared memory between the two processors stores the incoming as well as outgoing RTP data. Since the DSP needs to support N number of channels, this memory will contain N receive as well as transmit buffers of length 320 bytes each (for video these buffers need to be of 1500 bytes). Data structure for messaging between host and DSP as well as information needed on per call basis needs to be defined The following steps define the DSP functionality. a. At boot up once the software is downloaded to DSP (the DSP will indicate the same by writing a predetermined value at a fixed memory location to indicate to host that the software is downloaded).
b. Upon successful download of software., the DSP will run an internal timer of
10msec
At this time the DSP is polling for channel state to change to process, which is set by the host once the packet arrives, c A start call or open channel command from the host indicating codec type, data- ready as well as call type (initially only voice) is sent for RX as well as TX direction. d. Based on channel opened the DSP picks up the RTP data from the external buffers and performs the DSP related functionality on those, e On the TX side the DSP places encoded data on the externa! buffers to be picked up by the TX agent,
[008 ϊ] Fig. 3 depicts a mobile equipment client according to an embodiment of the invention
[0082] The client software or handset software runs on the handsets that are compatible vάth the Divitas Server. Typically these are dual-mode handsets that
the capability to provide telephony connection on the cellular network (CDlViA or GSM) as well as IP connection on the LAN network (wired LAN or wireless LAN).
[0083] The software can be also be compiled for a desktops/laptops or a PDAs which have a microphone and a speaker to function as a softphone. [0084] User interface [0085] The client user-interface provides the following functionality
• Setup startup configuration - DNS IP addresses, Divitas server I1RL, Startup user-state ( 1 NYlS 1 B LE/A VA I LABLE), security settings
• Change user state (INVISIBLE/AVAILABLE)
• Add enterprise '"buddies" and get their presence information (lNVlSIBLE/AVAILABLE/C ALL-IN-PROGRESS)
• Display availability status of enterprise "buddies" and connect to them
• User Interface to common enterprise telephony features
• call making
• call receiving
• call waiting
• caJl forwarding
• call transfer
• multi-party conferencing
• voice-mail notification
• missed cails notification
• received calls notification
• placed calls notification
• number lookup and dial by name
• Manual override to use cellular network instead of WiFi network
• Display version mismatch
• Upgrade request/status
• Disable/inhibit client software - ISP application is used to make/receive cellular calls CaI S -control and voice
• CaI! control for making VoIP calls on LAN interface
• Voice Engine for making VoIP calls on LAN interface - includes codecs., echo- cancellation, jitter control, error concealment
• Ca! 1 handoff from eel i u I ar call to Vo I P caJ 1
• Call handoff from VoIP call to cellular call [0086] 802 1 1
• Determine which IP networks are available and their signal strength and communicate that information to the server
• AP client
• Power management of 802 1 1 miniport - whenever the signal strength of 802.11 is below acceptable threshold, hibernate and poll networks at infrequent intervals to conserve!" power
• Package the signal strength and voice-quality info into RTCP packets if the call is in progress, or in keepalives if the call is not in progress to communicate to the server Whenever the signal strength drops below an acceptable threshold or the voice-quality deteriorates, the server will make a decision to switch the calls from VoIP to cellular network.
[0087] Platforms
[0088 j Since there are a multitude of handset vendors in the market and a lot of them coming up with dual -mode handsets, the software may need to be designed in such a way that most of the code is shared across handsets Therefore, the code has to be divided into platform dependent part and platform independent part Most, in fact ail of the ϋivitas core value should be in platform independent part of the software, which should be easily portable from one
platform to another. The platform dependent part should be only the functional adaptation layers (particularly Telephony, LAN, 802 1 !, Audio and Display adaptation layers). Whenever the code is ported to a new platform, only these adaptation layers need to be modified or rewritten, while providing a uniform API to the platform independent pan.
[0089] The client software will run on multiple handset platforms. The most prevalent handset platforms are Windows CE, Synibian and Linux.
[0090] In addition to the dual-mode handsets, the client application is designed to work on
802 i 1 phones, PDAs or laptops/desktops which do not have a cellular telephony interface. On these platforms, a subset of features is available to the user. Basically, the call hamtoff from
VoIP to cellular will not be possible,
[0091 ] Theory of Operations
[0092] Startup and Security Operations
[0093] On startup, the client application looks for the available resources on {he handset.
The client application first checks for presence of wired network. If not present, then the client application checks for the presence of an 802 ϊ 1 network. The wired or wireless medium authentication is done depending on the enterprise security policy. The handset client shall support the security mechanism employed in the enterprise The most common security mechanism is WPA (WiFi Protected Access) Once the authentication is done successfully, the wireless client gets the IP address for the IP interface using DHCP.
[0094] The application gets the Divitas server URL and DNS JP addresses from persistent database and tries to register with a Divitas server.
[0095] The client application could be running on a handset, which Is inside the enterprise network. In that case, the client can reach the Divitas server without any other security blankets. In case the client is in a public network, say a coffee shop or an airport with WiFi internet access, typically the user sets up a VPN connection to the enterprise. The client can reach the Divitas server only after the λ'PN tunnel is setup.
[00%] The client application software authenticates the handset with the server by sending an encrypted certificate (installed by Enterprise IT) to the server. Once the handset is authenticated, the diem gets the login/password from the user or stored in the handset, encrypts the login/password and sends the encrypted login/password to the .server for user authentication On successful authentication, the server replies by sending the enterprise phone number In reply, the client sends the cellular phone number to the server. The server binds the two for all future handoff scenarios.
[Ou1-)?] The signaling and media stream are secured using SIP/'I LS for signaling and SR (T for media stream However, if the user is on a VPN link, then client need not add another level of encryption Adding another
e! of encryption to that may result in reduced voice quality In that case, SlP is used for signaling and RTP/ RTC P for media stream [00% ] The above process is repeated whenever the client regains network eonneeth if) w ith the server
[0090J Steady state operations
[00100] The user can choose to be INVISIBLE or AVAILABLE at startup by configuring on the GUI and saving that configuration in the persistent database The client updates the user's presence information to the server
[00101 ] The user can also enter frequently called buddies within the enterprise and save that configuration in the peisistent database on the handset The client gets the presence information (in bulk) of these buddies whether the) aie INVISIBLE, AVAILABLE or CALL- IN -PROGRESS The server updates the presence information of these buddies to the clients as and when the event occurs
[00102] a cail is not in progress, the client and sen er exchange keepalh es periodically
[00103] The client sends the network status to the server periodical!}- If the client is on an 802 ! 1 wireless network, the client sends the SSlD. si goal -strength and bandwidth of the associated access point CAP} to the sεrsεi (f there is a call in progress, the client sends the SSiD as part of ιn-band RTCP packets If there is no call in progress, the client sends out-of- band keepalh e messages
[00104] Whenever a network session is available from the client to the server, the preferred mode of making and reeek ing calls to the client is on the network interface However, the user can choose to override the preferred mode and make the outgoing calls on the cellular network This selection is not communicated to the server and may not affect the incoming calls This selection is also not stored in persistent database The user has to expiicith make the selection even.' time the user makes an outgoing call
[00105] Whenese? a netwoik session is not available fiom the client to the seivei, the onlx wa\ of making and receiving calls is on the cellular interface The user does not have access to all the cnteiprise features The user can make and receive cails using the client sofrtvaie UI however the client software provides onlv a subset of the service provider features To use all the features of the cellular service provider network, the user may have to terminate (or inhibit)
ϊt>
the client software and use the cellular sen- ice providers dialer application. If the serv ice provider application is being used to make and receive calls, then the handoff described below in section 3 4.2 will not be possible
[00106] A user has access to all the enterprise features as long as the client has a session established to the server. The client GUI is used to provide access to these enterprise features to the user. [00107] Voice
[00 i 08] SlF' signaling is used to establish voice calls between the client and the server. Voice from the audio receiver is encoded into one of the codecs supported by GlPS Voice Engine (VH), encapsulated into RTF packets, encrypted if needed, and sent on the IP interface to the server Similarly RTP packets received from server is decrypted if needed, decoded using one of the codecs and played out. Speech decoding, jitter control and error concealment are done by GIPS VE on the receive side.
[00109] In addition to encryption/decryption, encoding/decoding of speech, GΪPS Voice Engine performs error concealment, jitter control, adaptive packet buffering. Acoustic Echo Cancellation and Suppression, Noise Cancellation and Suppression, Automatic Gain Control, Voice Activity Detection, Comfort Noise Generation [001 10] Roaming
[001 1 1] A handset client is a mobile device, unlike the portable laptops [001 12] 1 ntra-WL A N handofT
[00 i 13] When a user is in an 802.1 1 network having a phone conversation and walks across the building, an AP handoff could occur viz. the handset of the user is now associated with a different AP than the one the handset was previously associated with The AP handoff could occur without IP address change if the handoff is within the same subnet or to another subnet, in which case the IP address of the handset changes if the IP address changes, then the client needs to register with the server again. The established calls continue to flow in the meantime using the old flow information until the Voice-Engine (VE) is communicated of the new IP address. Voice-engine ensures that the RTP streams going out of the client will have the new- IP address
[001 14] When a wi reless client authenticates using 802.1 X, there are a series of messages sent between the wireless client and the wireless access point (AP) to exchange credentials. This message exchange introduces a delay in the connection process. When a wireless client roams from one wireless AP to another, the delay to perform S02 I X authentication can cause
noticeable interruptions in network connectivity, especially for time-dependent traffic such as voice or video-based data streams. To minimize the delay associated with roaming to another wireless AP, the wireless equipment can support FMK caching and preauthentication [001 15] PMK Caching
[001 16] As a wireless client roams from one wireless AP to another, the wireless client must perform a full 802. iX authentication with each wireless AP, WPA allows the wireless client and the wireless AP to cache the results of a full 802. IX authentication so thai if a client roams back to a wireless AP with which the wireless client has previously authenticated, the wireless client needs to perform only the 4-vvay handshake and determine new pairwise transient keys. In the Association Request frame, the wireless client includes a PMK identifier that was determined during the initial authentication and stored witli both the wireless client and wireless AP's PMK cache entries. PMK cache entries are stored for a finite amount of time, as configured on the wireless client and the wireless AP.
[001 17] To make the transition faster for wireless networking infrastructures that use a switch that acts as the 802. IX authenticates; the WPA/WPS IE Update calculates the PMK identifier value so that the PMK as determined by the 802.1 X authentication with the switch can be reused when roaming between wireless APs that, are attached to the same switch. This practice is known as opportunistic PMK caching [001 18] Preauthenti cati on
[001 19] With preauthentication, a WPA wireless client can optionally perform 802.1 X authentications with other wireless APs within its range, while connected to its current wireless AP. The wireless client sends preauthentication traffic to the additional wireless AP over its existing wireless connection. After preauthenticating with a wireless AP and storing the PMK and its associated information in the PMK cache, a wireless client that connects to a wireless AP with which the wireless client has preauthenticated needs to perform only the 4-way handshake.
[00120] WPA clients that support preauthentication can only preauthenticate with wireless APs that advertise their preauthentication capability in Beacon and Probe Response frames. [00121 ] WiFi-Celluiar handoff
[00 ! 22] When the user in an 802. 1 1 network having a phone conversation walks out of the building where there is no or insufficient 802.1 1 connectivity, the call is handed over to cellular network.
[00123] The decision to handofTthe cali is made by the client. The decision is based on 802. ! ] signal -strength, channel loading and voice-quality thresholds. Once the decision is made, the decision is communicated to the server, which initiates a cali to the client on the cellular network. The client checks the caller-id of the incoming call, compares to the 802.1 1 ca!!er-id. and if there is a match, accepts the cellular call and drops (he 802 1 1 call leg. On the server side, the server drops the 802 11 call leg to the client, patches the cellular call leg to the other talking party [00124] Cellular- WtFi handoif
[00125] When the user having a phone conversation on cellular network walks into an S02. 1 I network, and the handset/user can associate itself with a di vitas server, then if the user is talking to another user in the S02.1 1 network, the call is handed over to the 802. 1 1 network [00126] The decision to handoffthe call is made by the client. The decision is based on availability of sufficient 802.1 \ signal-strength, channel loading and voice quality Once the decision is made, the decision is communicated to the server, which initiates a call to the client on the 802 S 1 network The client checks the caller-id of the incoming call, compares to the cellular caller-id, and if there is a match, accepts the 802. i 1 call and drops the cellular call leg The server drops the cellular call leg to the client, patches the 802.1 1 call leg to the other talking party [00127] Power Save
[00128] When the handset client is idle on the 802 1 1 network, the 802 1 1 mini port goes to sleep Before going to sleep the handset tells the AP that the handset wishes to go to sleep by setting the power save bit in the 802 1 1 header of every frame. The AP receives the frame, and notices the client's wish to enter power save mode. The AP begins buffering the packets for the client while the client's 802. i i mini port is asleep. The mini port consumes very little power while asleep. The miniport wakes up periodically to receive regular beacon transmissions corning from the access point The power-saving clients need to wake up at the right time when the beacons are transmitted to receive the beacons TSF (Timing Synchronization Function) assures AP and power-save clients are synchronized. TSF timer keeps running when stations are sleeping These beacons identify whether sleeping stations have packets buffered at the AP and waiting far deliver)* to their respective destinations
[00129] When there are no incoming beacons for an extended period of time, the 802.1 1 miniport is put to sleep. The miniport periodically wakes up, probes the air for APs, if there axe
none present mini port goes back to sleep, In this case, the mini port sleeps for longer duration than previous case.
[00130] B . Codec Based Acousti c Ec ho Cancel S ati on
[00 ! 3 ] j One or more embodiments of the present invention relate to an apparatus for canceling a signal. The apparatus may include an identification code (ID code) generator configured to generate an ID code. The apparatus may also include an ID code injector configured to inject the ID code into at least one of the signal and a processed signal to produce a convolved signal. The processed signal may be resulted from a processing of the signal The apparatus may further include an ID code detector configured to detect at ϊeast one of the convolved signals, a transformed signal, and a transformation of the convolved signal, the transformed signal resulting from the transformation of the convolved signal. The apparatus may further include an arithmetic function configured to remove at least one of the convolved signal and the transformed signal.
[00132] Fig 4 depicts a method for codec based acoustic echo canceller in accordance with one or more embodiments of the present invention
[00133] When both near-end and far-end speakers are talking, it is difficult to differentiate the echo of the far-end talker's voice from the near-end talker's voice since both are present in the near-end signal input with the same human voice characteristics In this application, a new method is proposed for handling the acoustic echo, which h quite different from the current conventional AEC.
[00 i 34] One embodiment of the present invention is a method for canceling echo during a communication between a Orst node and a second node. The method includes injecting a secret code to a signal input of the first node. In accordance with one or more embodiments of the present invention, the first node is a network device used by a far-end user, and the second node is a network device used by a near-end user. In accordance with one or more embodiments of the present inv ention, the first node is a network device used by a near-end user, and the second node is a network device used by a far-end user.
[00135] In accordance with one or more embodiments of the present invention, a secret code is injected into the far-end signal input. So a single or multiple echoes of the far-end signal will carry on this secret code and arrive at the near-end signal input. The near-end signal also includes the near-end speaker voice. Since the secret code is carried only on the echoes of the far-end signal but not on the near-end talker's voice, the secrete code may serve as the identities of those echoes and help us to differentiate them from the near-end speaker voice.
Some kinds of the matching filters can be employed iike the correlation or other means to identity the echoes of the far-end signal from the near-end speaker voice by the secret code and to remove them. A final echo-free signal will be generated on the far-end signal output. [00 ! 36] In order to make this new scheme work, there are two key implementation considerations. One is how to select and design the secret code and another is how to inject the secret code into the far-end input signal. Both considerations come from the same concern that the secret code should not be perceived by the end-end listener
[00 i 37] When a person speaks in front of the microphone, not only this person s voice but also some degree of the background noise will come in the microphone. But usually this background noise does not disturb the listener as the speaker voice masks out the background noise. As long as the background noise keeps low and the SNR {signal-to-noise ratio) keeps above certain threshold, the background noise should not become a concern. In fact, the background noise always exists in the real voice communications today. [00138] Based on the above fact, first the secret code can be transformed into a pseudo random noise called "secret code random noise". Subsequently, the existing background noise is removed from the far-end signal input, and the secret code random noise is inserted into the far-end signal input. As long as the new SNR is kept above certain threshold, the near-end listener should not hear any difference. In accordance with one or more embodiments of the present invention, the injector shown in Fig. 4 scrambles the secret code to a pseudo random noise, removes the existing background noise in the tar-end signal input, and then inserts the secret code random noise.
[00139] The far-end signal detector will detect the far-end signal presence and trigger the secret code generator since the echoes will be present only when the far-end talker is speaking. The secret code pilot can include the secret code timing and the phase. The secret code pilot detector is used to detect the secret code pilot carried on the echoes of the far-end signal and to adjust the secret code delay to the matching filter because of the variable echo paths. The unscrambling process will be needed in the secret code pilot detector. [00140] The secret code and the secret code pilot may be designed so that the secret code detector and the matching filter can easily identify the echoes of the far-end signal, which carry this secret code and its pilot and then remove these echoes. In addition, a non-linear processor may be used after the matching filter to further reduce the residue echo and improve AEC performance.
[00 i 41 ] Features and advantages of the present invention may be better understood with reference to the figures and discussions that follow.
[00142] Echoes have been a significant problem in communication. As discussed in the background of the invention, in the prior art, a filter (or echo canceller) may be employed to model an echo path in trying to provide signals to cancel the echoes
[00143] Fig 8 A shows a block diagram of an example prior -art corn muni cation device 800 (prior-art device 800) including a fl lter 814 (or echo canceller 8 ! 4) for echo cancellation, As shown in the example of Fig. 8A, prior-art device 800 may include a signal receiver 802 for receiving far-end signals (e.g., signal y") from a remote (or far-end) party and a signal transmitter 818 for sending signals (e.g., signal ?..) to the remote part)'.
[00144] Prior-ail device 800 may also include a speaker 806 for playing out the received signals to a user of prior -art device 800 (i.e., a local or near-end party) and a microphone 810 for collecting near-end signals (e g , signal x, which may include voice of the local party and background noises).
[00145] Prior-art dev ice 800 may also include buffer 812 for buffering signals received from signal receiver 802 and filter 814 for modeling an echo path 808 between speaker 806 and microphone 810 and for processing signals buffered in buffer S12. Echo path 808 may represent multiple paths of delay, attenuation, reverberations, etc , transforming signal y" into signal y I , for example.
[00146] Prior-art dev ice 800 may further include sum mati on function 816 for subtracting outputs of filter 1.14 from outputs of microphone S lO, Prior-art device 800 may further include a signal feedback path for feeding outputs of the summation function 816 back to filter 814
[00147] A signal (e g., signal y") received by signal receiver 802 may be forwarded to both speaker 806 and buffer 812. Riter 814 may receive the signal from buffer 812, process the signal with a model of echo path 808 to generate a cancelling signal (e.g , κ2, a function of y"), and send the cancelling signal to a summation function 81(> In turn, summation function 816 may subtract the cancelling signal (e.g , x2~f(V) received from filter 814 from a signal (e.g , Xl=1X+)11 ) received from microphone 810 to generate a subtracted signal (e.g , z) and send the subtracted signal to signal transmitter 818 The output of summation function 816 may be fed back to the filter 814 for updating and improving the echo path model in filter 814.
[00 i 48] The echo cancel lati on method implemented in prior arrangement 800 i s further described with reference to Fig. 8B
[00149] Fig. SB shows a flowchart of an example prior art method utilized, for example, in prior-art device 800 (shown in Fig. 8A), for cancelling echoes. As shown in the example of Fig. SB, the method starts with step S50, at which signal receiver 802 (shown in Fig. 8A) may send a signal y\ Then, control may be transferred to step 852 and 854
[00150] At step 852, speaker 806 (shown in Fig. 8A) may receive signal y\ At step 156, microphone 810 (shown in Fig. 8A) may receive a signal yi plus near-end signal x. Signal yl may represent a transformed signal of signal y' because of delay, attenuation, reverberations, etc. The delay, attenuation, reverberations, etc. may be caused by echo path 808 between speaker 806 and microphone 808 (shown in Fig. 8A). Signal x. may include the local party's voice plus local surrounding background noises picked up by microphone SiO. Signal x I that represents a combination of signal yl and signal x may then be sent to summation function 816 (shown in Fig 8A).
[00151] At step 854, buffer 812 may also receive signal y\ At step 858. filter 814 may process signal y' with a model of echo path 808 to produce signal x2s a function of y\ e.g., f(y )> which is then sent to summation function 816 (shown in Fig 8A).
[00152] At step 860, summation function 81.6 may subtract signal x2 from signal xl to produce a signal z. Ideally, if f(y\) equals to yl, then z will equal to x, the near-end signal that is of interest to the remote party with echo (represented by y i ) removed However, the model of echo path 808 implemented in filter 8 S 4 may not be accurate, and typically z may not be equal to x.
[00153] At step 862, summation function 816 may send signal z to signal transmitter 818 for z to be transmitted the remote party.
[00 ! 54] At step 864, summation function 8 S 6 may feed signal z back to filter 8 i 4, for updating and improving the echo path model utilized at the step 858. The feedback of signal z and associated calculations and updates may cause filter S 14 to require additional processing time or processing power.
[00155] The quality of signal z (i.e., the error of signal z with respect to signal x) may- depend on algorithms and echo path modeling implemented in filter S14 as well as the processing power and memory of the computing device implementing filter 814.
[00 i 56] For prior art devices, arrangements, and methods, as illustrated b\ prior-art device 800 of Fig 8A and the method of Fig SB, correct modeling of echo path S08, as performed by filter 814, may be crucial for effectively cancelling echoes How
surrounding noises, reverberations of the surrounding noises, and/or other factors, echo path 808 may be dynamic and therefore may be difficult to model, eoirectly As a ie>ulf, the prior art devices, arrangements, and methods may not be able to effectively cancel the echoes
[00157] The prior an
ices, arrangements, and methods may face further challenges in double-talk scenarios, in which the local (or near-end) parts1 and the remote f or far-end) party arc talking at the same time Since the local party's voice and the remote party's voice rna> have similar human voice characteristics, filter 814 may be unable to correctly identify which signals to be input into the model of echo path 808 As a result, part of the local party's voice may be cancelled, and part of echoes ma) not be cancelled, and the error of the echo path model m filter 814 may become divergent instead of converging, resulting in undesirable quality of communication
[00158] Accordingly, in the prior art, much resource lias been devoted to improving algorithms for modeling echo path 808. Further, filter 114 may require a large amount of data memory and may require a CTL(S) with high processing power As a result a high cost for implementing echo cancellation may be incurred
[00 ! 59] In contrast, one or more embodiments of the present invention involve an apparatus for canceling a signal even if a fiitei is not
ided In one or moie embodiments, the signal may represent a digital signal The apparatus may include an i dentin cation code (ID code) generator configured to generate &n ID code The apparatus may also include an ID code injector configured to inject the ID code into at least one of the signal and a processed signal to produce a convolved signal The processed signal ma) be resulted from a processing, such as backgtound noise removal, of the signal fhe apparatus may further include an ID code detector configuied to detect at least one of the convolved signal, a transformed signal, and a transformation of the convolved signal, wherein the transformed signal ma> be resulted from the transformation of the convolved signal The transforation of the convolved signal may be caused by the configuration and/or environment of the apparatus For example, the transformation of the convolved signal may represent the delay caused b> one or more echo paths between the speaker and the microphone of the apparatus, the transformed signal may- represent a delayed signal given the existence of the delay The apparatus may further include
an arithmetic function configured to remove at least one of the convolved signal and the transformed signal.
[00160] Fig. 9A shows, in accordance with one or more embodiments of the present invention, a block diagram of a communication device 900 (device 900) that may cancel echoes even if a filter is not provided. The block diagram may also represent a communication system or arrangement with the components shown in Fig. 9 A implemented In one or more devices.
[00161 ] Device 900 may include input/output components such as a signal receiver 904 (for receiving a far-end signals from a remote party), a signal transmitter 932 (for sending signals to the remote party), a speaker 914, and a microphone 916 (local microphone 916). An echo path 90S that travels from speaker 914 to microphone 9i(S may exist
[00162] Device 900 may also include a signal -processing module such as a background- noise remover 906. Background-noise remover 906 may be configured to remove background noise from signals received from signal receiver 904. Background-noise remover 906 may be implemented utilizing one or more well-known algorithms such as spectral subtraction for removing the background noise.
[00163] Device 900 may also include modules for canceling echoes. The modules may include identification code generator 922 (IB code generator 922), identification code injector 910 (ID code injector 910), identification code detector 924 (ID code detector 924), and buffer 926. The modules may also include a transformation module such as, for example, delay 928, for transforming signals such as, for example, introducing a delay. The modules may also include an arithmetic function such as, for example, summation function 930.
[00164] ID code generator 922 may be configured to generate a controllable and removable ID code such that a portion of a signal may be identified. The portion of the signal may then be removed, for example, for echo cancellation purposes. The ID code may represent a pseudorandom code that may simulate a background noise or comfort noise, ID code generator 922 may include a linear feedback shift register for generating a pseudorandom noise sequence to be utilized as the ID code.
[00165] Alternatively or additionally, the ID code may include a high frequency or low- frequency signal that is unperceivable to human ears. In one or more embodiments, the sampling rate of microphone 916 may be configured to process the high frequency or low- frequency signal, for example, through configuring hardware and/or software (or driver) of
microphone c>16. In one or more embodiments, with the LD code representing a signal that is unperceivable to human ears, device 900 may not include background-noise remover 906.
[00166] ID code injector 910 may be configured to inject the ID code generated by ID code generator 922 into a signal ID code injector 910 may be implemented by some well-known algorithms such as digital correlation for inserting the ID code into the signal, for example, by convolving the ID code with the signal to produce a convolved signal.
[00167] ID code detector 924 may be configured to detect the ID code within the convolved signal, for example, in a mixed, superimposed, and/or further convolved signal involving one or more other signals. Alternatively or additionally, IO code detector 924 may be configured to detect a transformed signal resulted from a transformation of the convolved signal and/or the ID code; the transformation may be caused, for example, the configuration and/or environment of device 900. Additionally or additionally, ID code detector 924 may be configured to detect the transformation. The transformation may include a delay and a signal level attenuation. ID code detector 924 may implement one or more well known algorithm such as digital correlation or match filter for detecting the ID.
[00168] Delay 928 may be configured to introduce a delay into a signal. The delay may be employed in simulating the transformation. Delay 928 may be implemented by a simple delay line shift register for introducing the delay.
[00169] Each of noise remover 906, ID code generator 922, ID code injector 910, ID code detector 924, and delay 928 may be included in software that may be downloaded to a user device such as, for example, a telephone, a mobile phone, a teleconference device, etc. (e.g., for acoustic echo cancellation) and/or a server device (e.g., for line or network echo cancellation).
[00170] Fig. 9B shows, in accordance with one or more embodiments of the present invention, a block diagram of ID code generator 922 employed in device 900 (shown in Fig. 9A). ID code generator 922 may only include a code generator 921 which will generate a random code directly. In this case, the code generator 921 may be implemented by some well- known algorithms, such as linear feedback shift register with carefully selecting an appropriate feedback function.
[00171] However, ID code generator 922 may include a code generator 921 followed by a randomizer 923. In this case, the code generator 921 can generate an appropriate identification code first without worrying about the randomization. Then this identification code is fed to the
randomizer 923 to become a pseudorandom noise sequence as the output of 922. The randomizer 923 could be implemented by a modified finer feedback shift register with its feedback function controlled by the code generator 921.
[00172] Fig. 9C shows, in accordance with one or more embodiments of the present invention, a flowchart of a method for cancelling echoes, for example, in device 900 (shown in Fig, 9A). The method starts with step 952, at which the signal receiver 904 (shown in Fig. OA) may receive a signal y'(n) from the remote party.
[00173 ] At step 954, noise remover 906 may remove background noise from yXn), resulting in a signal y(n). The background noise may be removed in order to make room for an ID code thai includes a random noise Accordingly, the local party may not receive excessive noise.
[00! 74 j Al step 958, ID code generator 922 (shown in Fig, 9A) may generate an ID code c(n). The ID code c(n) may represent a known and controllable function. At step 956, ID code injector 910 {.shown in Fig. 9A) may injects the ID code c(n) into signal y(n). As a result, a convolution of cfn) and y(n) may be generated. For example, the convolution of c(n) and y(n) may be a convolved signal c(n)*y{n). Then, control may be transferred to step 962 and step 980.
[00175] At stop 962, speaker 914 (shown in Fig. 9A) may receive the convolved signal c(n)*y(n). At step 964, microphone 916 (shown in Fig. 9A) may receive a delayed signal from speaker 914, i.e., signal c(n-d)*y(n-d). Microphone 916 may also pick, up another input signal x(n), which may include voice of a local party (e.g , in a double-talk scenario) and/or background noise surrounding microphone 916. Microphone 916 may then output a combined signal x(n) ÷ c(n-d)*y(n-d) to ID code detector 924 (shown in Fig. 9A) and summation function 930 (shown in Fig. 9A).
[00 ! 76] At step 980, buffer 926 (shown in Fig. 9A) may buffer a copy of convolved signal e(n)*y(n) and output the copy of the convolved signal to delay 928.
[00177] At step 966, ID code detector 924 (shown in Fig. OA) may detect the (D code c(n-d) in the combined signal x(n) + c(n-d)*y(n-d) and may determine a delay amount d by comparing c(n-d) with c(n) received from ID code generator 922 given that c(n) is a known and controllable function. The delay amount d may be fed into delay 928 (shown in Fig. 9A).
[0Oi 78] At step 982, delay 928 (shown in Fig. 9A) may introduce the delay amount d into the output of buffer 926 from step 980, Le., a copy of c(n)*y(n), resulting in a copy of c(n- d)*y(n-d).
[00179] At step 990, summation function 930 (shown in Fig. 9A) may subtract the output of step 982, i.e., the copy of signal c{n-d)*y{n-d), from the output of step 964, i.e., signal x{n) -*- e(n-d)*y(n-d). Sn other words, at step 990, summation function 930 calculates signal x(n) ÷ c(n-d)*y(n-d) - c(n-d)*y(n-d) to obtain signal x{n), which may represent the input signal picked up by receiver microphone 916 (shown in Fig. 9A) with no presence of an echo of signal y'(n), which may be represented by signal y(n-d). Signal x(n) may include voice of a local party, e.g., in a double-talk scenario, and/or background noise surrounding microphone 916
[0018Oj At step 992, signal x(n), including voice of a local party, e.g., in a double-talk scenario, and/or background noise surrounding microphone 916 and containing no echo, may be sent to signal transmitter 932. Thus, echoes may be effectively canceled in both signal-talk and double-talk scenarios.
[0018Ij As can be appreciated from the foregoing, embodiments of the present invention may effectively cancel echoes without the need of a filter (or echo canceller) that is required in a prior art device, arrangement, or method. Being immune to possible errors in echo path modeling that the filter may rely on, embodiments of the present invention may provide more accurate echo cancellation and faster cancellation, and therefore better quality of service. Further, the embodiments of the present invention may effectively cancel echoes in double-talk scenarios where conventional filters may usually perform poorly.
[00182J Without substantially relying on filter and associated complexity of echo path modeling, embodiments of the present invention may also advantageously eliminate the netd for high CPU processing power and large data memory thai may be required by the filler, thereby reducing the cost in implementing echo cancellation.
[00183] C. Content-Based jitter Buffer Scheme for Voice/Video over IP Communications [00184] One or more embodiments of the present invention provide a mechanism to handle excessive WLAN jitter using VAD and jitter compensation for audio. One or more embodiments of the present invention work also for video where lack of motion or no motion is used in conjunction with packet jitter,
[00185] One or more embodiments of the present invention relate to a packet communication device. The packet communication device may include a detector configured
to detect a characterized content in incoming packets received by the packet communication device. The packet communication device may further include a play-cn.it control configured to perform an adjustment of the incoming packets to produce adjusted packets and output the adjusted packets, if the detector has detected the characterized content in the incoming packets [00186] A new jitter buffer scheme called content-based jitter buffer is proposed to overcome the current jitter buffer technology limitation. In accordance with one or more embodiments of the present invention, not only the RTP header information of the incoming packets, but also tlieϊr RTP payload contents to identify the silences and talk spurts on the incoming packets are observed. Then based on this silence or talk spurt cue to decide when the piay-out delay can be inserted to compensate the network packet jitter. With this new scheme, the jitter buffer on the receiver side will no longer depend on the transmitter's silence suppression any more.
[00 ! 87] Fig 5A-B gives a high level overview of the jitter buffer architecture. Is the path the packets will trace through functional blocks in the Voice Quality Engine (VQF,). The aim here is introduce an adaptive de-jitter controller to even out play-out. A similar scheme may be used to handle video jitter.
[00 ! 88] In one of prior art jitter buffer designs, a so-called receiver-side VAD (voice activity detection) may be used to prevent the jitter buffer overflow
[00189] In another word, the silence or talk spurt cue is used to flush the jitter buffer when the silence or talk spurt cue reaches the maximum length. The differences of the new scheme from the prior art design include that the silence or talk spurt cue is used to control when the play-out delay can be inserted to compensate the network packet jitter. So, in accordance with one or more embodiments of the present invention, the silence or talk spurt detection will become a key part of the jitter buffer scheme. Under some circumstances it may be too late to make any adjustment when the jitter buffer becomes overflow,
[00190] Here is how this content-based jitter buffer apparatus and methods can be applied to the real -world applications. Both voice and video cases are described as follows. [00191] The figure 5 A shows a block diagram voice of a jitter buffer in accordance with one or more embodiments of the present invention. The core jitter buffer includes one or more components for packet queuing, packet play -out, jitter calculation and jitter compensation. Here the decoder and VAD will generate a silence or talk spurt indicator. The silence or talk spurt indicator is then fed back to the jitter compensation part and used to decide when to insert the play-out silence to compensate the network packet jitter
[00192] Fig. 5B shows a block diagram of a video jitter buffer in accordance with one or more embodiments of the present invention The core jitter buffer is similar to voice's one, except the play-out delay will be inserted when there is no motion or very low motion on the video frames. Here after the decoder, the motion estimation and the motion compensation will generate a residue frame. A no-motion indicator can be formed from this residue frame plus some specific threshold. The no-motion indicator then fed back to the jitter compensation part and used to decide when to insert the play-out silence to compensate the network packet jitter In video, inserting the play-out silence is actually to stop playing out the new frame while repeating the previous video frame.
[00193] As discussed above, problems such as packet delays (i.e., late arrivals of packets), packet delay variations, and packet loss may have negative effects on quality of service (QoS) in packet communication. Packet delays and packet delay variation may also be known as jitter. To address the problems, in the prior art, a fixed de-jitter buffer scheme may be employed to compensate the late arrivals of packets by periodically inserting delays (e.g., in the form of silence packets or comfort noise packets) when playing out packets from a packet buffer. However, with the fixed de-jitter scheme, delays may be excessively inserted between voice packets, resulting in choppy voice.
[00194] In the prior art, a transmitter-side voice activity detector (VAD) may also be employed for adaptiveSy inserting delays, thereby compensating packet delays and packet delay variations. However, the transmitter- side VAD may not be supported by some user devices. Further, given existing VAD algorithms, the transmitter-side VAD may cause undesirable noise or choppy voice, for example, when a transmitting party is performing music playback, because pauses in music may be treated as silence and inappropriately handled For another example, when the transmitting party uses G.729AB codec with the transmitter-side VAD turned on to play out some music, the user in the receiver side may perceive distorted music. Therefore, the transmitter-side VAD may be commonly turned off by packet communication service providers and may not be able to compensate packet delays and packet delay variations. As a result fixed de-jitter buffer scheme may still be employed, and the quality of service may still be undesirable to a receiving party.
[00195] Further, in the prior art, a receiver-side silence detector may be employed for controlling packet buffer overflow, for preventing packet loss. However, according to arrangements in the prior art, voice packets may be discarded and therefore lost when the
packet buffer is nearly full or is full, and the quality of service røa\ be undesirable to the receiving party
[OC)I0Oj In contrast, embodiments of the present invention may employ a receive! -side silence detector for timely compensating delays and delay variations and adaptkely playing out packets from the packet buffer Advantageously, the transmitter -side VAD is not needed, and desirable quality of service may be provided Further, one or more embodiments of the present invention may employ a receiver-side video detector, thereby adaptive!)' handling jitter in video communication
[00197] The present invention relates, in one or more embodiments, to a packet communication deuce that ma) include a detector configured to detect a characterized content in incoming packets received by the packet communication device The characterized content may represent silence (e g , a time period with no voice packets received) in voice communication Alternatively or additionally, the characterized content may represent at least one of no motion and an amount of motion that is lower than a threshold For example, the threshold of a no-motion or still picture may be selected to be 10% to 15% (in terms of data volume) of the full active picture in video communication
[OGl0Sj The packet communication device may further include a play-out control configured to perform an adjustment of the incoming packets to produce adjusted packets and output the adjusted packets, if the detector has detected the characterized content in the incoming packets The adjustment ma\ include insertion of a delay, for example, in the form of silence packets or comfort noise packets Alternatively oi additionally, the adjustment may include repeating playing out packets that have been
played out .As a result, the delays and delay variations of the incoming packets received at the packet buffer may be timel) compensated, and the adjusted packets may be of acceptable quality to the receiving party
[OGl00J "Peat ui es and advantages of the present inv ention may be better understood with reference to the figures and discussions that follow
[00200] Fig I OA shows a block diagram of a first example prior art packet voice communication arrangement (first prior art arrangement) with an adaptive jitter buffer scheme As shown in the example of Hg 10/V the first prior art arrangement includes a transmitter-side device 10*51 and a rεccivct-sidc device 1002, connected through network 1003 Each of
transmitter-side device 1091 and receiver-side device 1092 may represent a telephone, a mobile phone, or a teleconference device.
[00201 ] Transmitter-side device 1091 may include the following components: speech buffer 1000, voice activity detector 1001 (VAD 1001), and transmitter 1002. These components may be described as follows;
[00202] Speech buffer 1000 may be configured to receive voice packets (packets) from a microphone, buffer the packets, and then transmit the buffered packets to VAD 100 i .
[00203] VAD iOOl may be configured to insert a silence descriptor (SID) when there is silence (i.e., a period of time between voice packets) in the packets received from speech buffer 1000.
[00204] Transmitter 1002 may be configured to receive the packets from VAD 1001 and transmit the packets to network 1003.
[00205] In turn, network 1003 may transmit the packets to receiver-side device 1092.
[00206] Receiver-side device S 092 may include the following components: packet buffer 1004, packet play-out control 1005., delay insertion control 1006, delay information module 1007, jitter calculator 1008, and play-out delay calculator 1009. These components may be described as follows:
[00207] Packet buffer 1004 may be configured to receive the packets from network 1003, buffer the packets, and then send the packets to jitter calculator 1008, delay insertion control 1006, and packet pi ay -out control 1005.
[00208] Jitter calculator 1008 may be configured to calculate the size of jitter in the packets. The jitter may represent silence, i .e., a time period between arrivals of two voice packets with no data.
[00209] Delay insertion control 1006 may be configured to determine when to insert delays based on SlDs inserted in the packets by VAD 1001 of transmitter-side device 1091. Delay insertion control iOϋό may receive jitter size information from jitter calculator 1008 and may receive packets from packet buffer 1004.
[00210] Play-out delay calculator 1009 may be configured to receive jitter size information from jitter calculator 1008. Based on the jitter size information, play-out delay calculator 1009 may calculate sizes of delays to be inserted into the packets.
[0021 1] Delay information module 1007 may be configured to consolidate information from delay insertion control 1006 regarding timing for inserting the delays and information from play-out delay calculator 1009 regarding the sizes of the delays. Accordingly, delay information module 1007 may build the consolidated information into a data structure and send the data structure to packet play-out control 1005.
[00212] Packet play-out control 1005 may be configured to receive packets from packet buffer ! 004 and insert delays into the packets, according to the data structure received from delay information module 1007
[00213] Fig. I OB shows a flowchart of a transmitter-side process of a prior art jitter buffer scheme utilized, for example, in the first prior art arrangement shown in the example of Fig 10A. The transmitter-side process starts with step 1060, at which speech buffer 1000 (shown in Fig. ! 0Aj may receive packets, for example, from the microphone used by a transmitting party. Speech buffer 1000 many then buffer the packets
[00214] At step 1062, speech buffer 1000 may set the marker bit of each packet to 0 by default. When each packet reaches the final step 1072, the marker bit of the packet may be set to I if the packet is the first voice packet of a talk spurt. Otherwise, the marker bit may be kept to O.
[00215] At step 1064, VAD 1001 may determine whether the packets contain one or more silence periods (i.e., one or more time periods with no data between packets). If the packets contain one or more silence periods, control may be transferred to step 1074; if not, control may be transferred to step 1066.
[00216] At step 1074, VAD 1001 may determine whether a SID(s) have been set in the packets. A SiD (silence descriptor) is configured to mark the beginning of a silence period. If the SID(S) have been set for a sslence period(s) in the packets, control may be directly transferred back to 1072, if not, control may be transferred to step 1076 before being transferred to step 1072, At step 1076, VAD 100! may generate the SID(s) for the packets. At step 1072, transmitter 1002 (shown in Fig. 10A) may transmit the packets to network 1003
[00217] At step 1066, VAD 1001 may determine whether the packets contain a first voice packet(s) after a silence period(s). If the packets contain a first voice ρacket(s), control may be transferred to 1068, at which VAD 1001 may set the marker bit(s) for the first voice packet(s) to 1. If the packets contain no first voice packetfs), control may be transferred to step 1072, at which transmitter 1002 may transmit the packets to network 1003.
[0021.8] Fig. 1OC shows a flowchart of a prior art delay calculation process. The delay calculation process may be part of the receiver side process utilized, for example, in receiver- side device 1092 of the first prior art arrangement shown in Fig. 1OA. The delay calculation process may be performed involving packet buffer 1004, delay insertion control 1006, jitter calculator 1008, play-out delay calculator 1009, and delay information module 1007 of receiver-side device 1092 shown in the example of Fig, 1OA.
[002 } 9} The deiay calculation process may start at step 1022, at which packet buffer 1004 may receive packets from network 1003 and buffer the packets. For example, the packets may represent packets transmitted by transmitter 1002 (shown in Fig. 10A) at step 1072 (shown in Fig. 1.0B).
[0022Oj At step 1024, jitter calculator 1008 may calculate an average jitter j. [00221 ] At step 1026, jitter calculator 1008 may calculate j itter deviation v.
[00222] At step 1028, play -out delay calculator 1009 may calculate a play-out delay using j and v and based on a network mode! represented by f(j, v), i.e., deiay d ~ f(j, v).
[00223] At step 1030, delay insertion control 1006 may determine whether packet buffer 1004 is empty. If packet buffer 1004 is empty, control may be transferred to step 1038; if not, control may be transferred to step 1032,
[00224] At step 1032 delay insertion control 1006 may determine whether marker bit(s) of value 1 have been set. If the mark bit(s) of value 1 have been set, control may be transferred to step 1038; if not, control may be transferred to 1034.
[00225] At step 1034, delay insertion control 1006 may determine whether there is a SID(s) in the packets. If there is a SlD(S), control may be transferred to step 1038; if not, control may be transferred to step 1036.
[00226] At step 1036, delay insertion control 1006 may determine whether the average jitter j is greater than a predetermined threshold. For example, the threshold here may be the length of packet buffer 1004.
[00227] If the average jitter j is greater than the predetermined threshold, control may be transferred to step 1038; if not, control may be directly transferred to step S 040.
[00228] At step 103S, delay information module 1007 may consolidate size and timing information for inserting delays, then control may be transferred to step 1040
[00229] At step 1040, information pertaining to inserting delays may be output to play-out control 1005.
[00230] Fig. 101) shows a flowchart of a prior art packet play-out control process. The packet play -out control process may be part of a receiver side process utilized, for example, in receiver-side device 1092 of the first prior art arrangement shown in Fig. 1 OA . The packet piay-out control process may be performed by packet play-out control 1005 shown in Fig 1OA.
[00231] The packet play-out control process starts at step 1042, at which packet play-out control 1005 may receive packets from packet buffer 1004 (shown in Fig. IC)A) and may receive the information pertaining to inserting delay as a result of step 1040 (shown in Fig. 10C) from delay information module 1007 (shown in Fig. K)A).
[00232] At step 1044, packet piay-out control 1005 may determine whether enough delays have been inserted. If enough delays have been inserted, control may be transferred to step S.048; if not, control may be transferred to step S.046.
[00233] At step 1046, packet play -out control 1005 may insert delays (e.g., in the form of silence packets or comfort noise packets) into the packets received from packet buffer 1004.
[00234] At step 1048, packet play-out control 1005 may retrieve packets from packet buffer 1004.
[00235] At step 1050, packet play-out control 1004 may play out packets resulted from steps 1046 and 1048.
[00236] Fig. 10E shows a schematic representation of received packet How at packet buffer 1004 (shown in Fig. I OA) when the transmitter-side VAD !0Ol (shown in Fig. I OA) is turned on. As shown in the example of Fig. 1OH, the received packet flow may include voice packets 1080, silence 1084 following voice packets 1080, voice packets 1.086 following silence 1084, silence 1.88 following voice packets 1086, etc. Silence 1084 and silence 10S8 represent time periods during which no voice packets are received at packet play-out control 1005. Since VAD 1001. is turned on, VAD 1001 may have set marker bits of first voice packets such as packets 1080a and 1086a to ! . The marker bits of value 1 may be utilized at step 1032 shown in Fig. K)C for determining when to insert delay
[00237] Further, VAD 1001 may have inserted SiD 1082 at the beginning of silence 1084 and SLD 1090 at the beginning of silence 1088. SlD 1082 and SID 1090 may also be utilized at step 1034 shown in Fig IOC to determine when to insert the delay.
[00238] Fig 1Oh shows a schematic representation of reeeh ed packet flow at packet buffer 1004 (shown in Fig !0A) when transmitter-side VAD 1001 {shown in Fig 10A) is turned off Because existing algorithms employed in VAD 1001 may cause undesirable noise or chopp\ for example, in music playback, VAD IUOl may commonly be turned off by packet communication sen ice
and therefore may not be able to provide information related to voice activity
[0023Q] As shown in the example of Fig 1OF, the received packet flow may include voice packets 10^2. silence packets 10*54 following voice packets 1002, voice packets 10% following silence packets 1094, silence packets 198 following voice packets 10%. etc Because VAD 1001 is turned off, there may be no SlD inserted for the silence periods represented, for example, by silence packets 1044 and silence packets iOL>8 As a result, step 1034 (i e , detecting SIDs) shown in Fig 1OC may not be performed
[00240] kuther, although voice packet 1092a may have a marker bit value of U all of the rest of the received packets may have a marker bit value of 0 Therefore, step 1032 (i e , determining whether mark bit values for first packets are set to I ) shown in Fig 1 OC may not be performed
[00241 j Still further, when VΛD 1001 on transmitter side 1091 is turned off. the packets may be continuously coming into the packet buffer 1004 on receiver side 10^2 such that packet buffer 1004 may never be empty Therefore, step 1030 (i e . determining whether packet buffer 1004 is empty) shown in Fig 1OC may not be performed as designed
[00242] Accordingly, when VAD 1001 is turned off. delay insertion control 1006 may not be able to perform steps 1030, 1032, and 10 >4 for determining the timing for inserting delays Although, at step 1036 shown in Fig 1OC, delay insertion control 1006 may still be able obtain information regarding whether the average jitter j{i) is greater than the predetermined threshold, the information is not sufficient for determining the timing for inserting the
For example, when the average jitter j(i) is greater than the predetermined threshold, it ma> base been to late to insert the delays Consequently, the delays may be inserted at inaccurate timing, causing choppy voice in voice communication
[00243] Furthermore, even if VAD 1001 is turned on. existing VAD algorithms may not enable VΛD 1001 to insert SlDs precisely Λs a result front-end clipping and 'or rear end clipping of voice packets may occur, and voice quality may be undesirable to a reeeh ing patty
3b
[00244] Fig 11 Λ shows a block diagram of a receiver-side device 1 100 of a second prior art packet voice communication arrangement (second prior art arrangement), which includes adaptiv e buffer o\ ertlow control As show n in the example of Fig 11 A. receiver-side
ice 1 100 includes the components of receiver-side device 1092 in the first prior art arrangement shown in Fig 1OA In addition, recei\ er-side device 1 100 includes additional component's i 180 The additional components ! I 80 may include decoder 1118, silence detector 1 S i 6. and buffer overflow control U S 4, described as follow 6
[00245] Decoder 1 118 may be configured to decompress voice packets
[00246] Silence detector J 116 may be configured to detect silence in the packets received from decode* 1 1 18 If there is silence, then silence detector 1 1 16 ma) sei a silence flag value to i If there is no silence, silence detector 1 1 16 may set the silence flag value to 0
[00247] Buffer overflow control 1 114 may be configured to monitor the status of packet buffer 1 102 According to the status of packet buffer 1 102. buffer overflow control 1 S 14 may determine whether to drop or to keep next packets received at packet buffer I i 02
[00248] Fig J IB show s a flowchart of a silence detection process, utilized for example, in receiver-side 1 100 shown in the example of Hg 1 IA fhe silence detection process starts at step \ 120, at which decoder 1 1 18 {&hovvn in Fig 1 IA) may decompress voice packets (packets) received from packet play-out conUol S 104 (shown in Fig 1 1 \)
[0024*^3 At step 1 124, silence detector 1 116 (shown in f-ig 1 IA) may determine whether there is silence in the received packets. If there is silence, control may be transferred to i 130, at which silence detector 1 1 16 sets the silence flag value to 1 If there is no silence, control may be transferred to step 1 126, at which silence detector 1 1 16 sets the silence flag value to 0
[0025Oj At step 1 128, silence detector 1 116 may output the silence flag value
[00251 j Fig 1 1C shows a flowchart of a buffet overflow control process utilized, for example, m receiver-side device 1 100 ^b own in the example of Fig 11 A The buffer overflow control piocess may be performed by buffer o\ ertlow control 1 1 14 t>hown in Fig 1 1 Λ The buffer overflow control process starts at step S 1 32, at which buffer overflow control 1 1 14 receives the silence flag value from silence detector 1 116 (shown in Fig 1 IA)
[00252] At step 1 134, buffer ovetflow contiol 1 1 14 may determine whether packet buffer i 102 (shown in Fig 2A) has reached a first threshold such as, for example, 100% full If
packet buffer 1 102 has reached the first threshold, control may be transferred to step 1 144. if not, control may be transferred to step I i 36.
[00253 j At step 1 144, buffer overflow control 1 1 14 may command packet buffer 1 102 to discard newly received packets, regardless of whether the newly receiv e packets represent voice packets Buffer overflow control
idc packets to be pia> ed out
[00254] At step 1 136, buffer overflow control i 114 may determine whether packet buffer i 102 has. reached a second threshold such as, for example, 80% full If packet buffer 1 102 has reached the second threshold, control mav be transferred to step 1 140. if not, control may be transferred Io step H 38
[00255] At step 1 140, buffci overflow control 1 L 14 may determine whether the silence Hag value received from silence detector 1 1 iό i& I If the silence flag value is 1, control may be transfcircd to step 1 142. if not, control may be tramfeired to step 1 138
[00256] At step 1 142, buffer overflow control 1 1 14 may command packet buffer 1 102 to discard newly received packets* since the newly received packets may represent silence Buffer overflow control 1 114 may also command packet buffer 1 102 to provide packets to be played out Control may then be transferred to step 1 138
[00257] At stop 1 138, packet buffer 1 102 may receive and buffer packets
[00258] The buffer overflow control process shown in the example of Fig 1 it may not be effective in maintaining quality of service tor example, when packet buffer 1 102 has reached the first threshold, e g , 100% full, voice packets may be discarded according to step 1 144 Therefore, choppy voice may be resulted Further, when packet buffer 1 102 has reached the second threshold but not the fust threshold, e g , 80% full but not 100% full, packet buffer i 102 may still receive bursts of voice packets which are greater than the remaining capacity of the packet buffer 1 102 Consequently, ov erflow may still occur, and packets (including voice packets) that exceed the capacity of packet buffer 1 102 may still be lost As a result, quality of service may be undesirable to a receiving party
[00259 j Mg 12Λ shows, in accordance with one or more embodiments of the present invention, a block diagram of a receiver-side device 1200 of a packet voice communication system with adaptive jitter handling Receiver-side device 1200 may represent a user device such as, for example, a telephone, a mobile phone, a teleconference device, an audio player, or
a video phone. Alternatively or additionally, receiver-side device 1200 may represent a server device in a packet communication network.
[00260] As shown in the example of Fig 12 A, receiver-side device 1200 may include one or more of the following components' packet buffer 1202, packet play-out control 1208, decoder ϊ 210, delay insertion control 1214. delay information module 1216, jitter calculator 1204, and play -out delay calculator 1206 Receiver-side device 1200 may further include a detector configured to detect a characterized content such as silence detector 1212 for detecting silence. Silence detector 121.2 may be configured to receive decompressed packets from decoder 1210, Silence detector 1212 may further be configured to process the decompressed packets and provide a silence flag (but not the decompressed packets) to delay insertion control 1214 through link 1299.
[00261 J One or more of the components may be included in software that may be downloaded into receiver-side device 1200
[00262] One or more components of receiver-side device 1200 may have capabilities similar to capabilities of components of receiver-side device I 100 shown in Fig. 1 IA. However, in contrast with silence detector 1 1 16 of receiver-side device 1 100, silence detector 1212 may be configured determine when to insert delays for handling jitters instead of or in addition to controlling packet buffer overflow.
[00263] Further, in contrast with delay insertion control 1108 of receiver-side device 1 100, instead of receiving information from jitter calculator 1204 as in the prior ait jitter buffering schemes, delay insertion control 1214 may receive information from silence detector 1212.
[00264] Delay insertion control 1214 may be directly coupled to silence detector 1212 through link 12W Link 1299 may represent a direct logical Sink or physical link. There may be no direct logical or physical connection between jitter calculation 1204 and delay insertion control 1214, in contrast with link 1 190 between jitter calculator 1 1 10 and delay insertion control i 108 shown in the example of Fig. I S A and link 10*59 between jitter calculator 1008 and delay insertion control 1006 shown in the example of Fig 1OA.
[00265] Fig. 12B shows, in accordance with one or more embodiments of the present invention, a delay insertion control process utilized for adaptive jitter handling utilized, for example, in receiver-side device 1200 shown in the example of Fig. 12A. The delay insertion control process starts with step 1220, at which delay insertion control 1214 (shown in Fig. 12A) may determine whether packet buffer 1202 (shown in Fig. 12A) is empty, i.e , containing
no packets for playing out If packet buffer 1202 is empty, control may be transferred to step !228, if not, control may be transferred to 1222
[00266 j At step 1222, delay insertion control 1214 may determine whether the marker bit(s) of \ alue 1 are set in incoming packets that are received through packet buffer 1202 If the mark bit(s) of value 1 aie set. control ma> be transferred to step 1228, if not, control may be transferred to 1224
[00267] At step 1224, delay insertion control 1214 may determine whether there is a SlD(s) in the incoming packets If there is a SΪD(s), control may be transferred to step 1228. if not, control mas be transferred to step 1226
[00268] At step J 226, delay insertion conttol 1214 may determine whether the silence flag value received from silence detectoi 1212 (shown in Fig 12A) h 1 If {he tάlenee flag \ alue a ' > \ , control may be transferred to step i228, if not, control may be transferred to step i 230
[00269] At step 122S1 packet play -out control 1208 (shown in Fig 12A) may insert dela> s (e g , silence packets or comfort noise packets) into the incoming packets according to information received from delay information module 1216 (shown in Fig. 12A) to generate adjusted packets 1 he delay information includes size information provided by p!a> -out de!a> calculator 1206 (shown in Fig 3A) and timing information ρro\ ided by delay insertion conttol S2I4
[00270] At step 1230, packet pia> -out control 1208 may play out the adjust packets The adjusted packets may be decompressed by decoder 1210 and then be played out by receiver- side device 1.200
[00271] As can be appreciated from Fig i 2B. in accordance with one or more embodiments of the present invention, delay insertion control 1214 may determine the timing for inserting delay s based on silence flag value received from silence detect oi 1212 (at step 1226) even if no information is received from jitter calculator 1204
[00272 j Fig 13 shows, in accordance with one or more embodiments of the present invention, a block diagram of a receiver-side device 1300 of a packet video communication system with adaptive jitter handling Receiver-side dev ice 1300 may represent at least one of a telephone, a mobile phone, a teleconference
a \ ideopiione, and a video player Alternative!) or additionally, receiver -side device 1300 may represent a server device in a packet communication network.
[00273] Receiver-side device 1300 may include components performing functions similar to functions of components of receiver-side device !2OC) shown in the example of Fig. 3A, Receiver-side device 1300 may include one or more of a packet buffer 1302, a jitter calculator 1304, a compensation control S314, a compensation calculator 1306, a compensation information module 1316, a packet play -oat control 1308, decoder 1310, and a video detector 1312.
[00274] What may be different may be that video detector 13 12 may be configured to detect no motion or Sow motion in video packets, instead of silence. Further, instead of being configured to calculate and consolidate Information for delay insertion, compensation 1306, compensation control 1314, and compensation information module 1316 may be configured to calculate and consolidate information for video compensation The video compensation may include stopping playing new video frames while repeating video frames and may be performed, by packet pi ay -out control 130S.
[00275] Similar to the configuration of receiver-side device 1200, compensation control 1314 may be directly coupled to video detector 1312 through link 1399 for determining timing for the video compensation.
[00276] The video compensation control process for jitter handling utilized in receiver-side device 1300 may be similar to the delay insertion control process shown in the example of Fig, S 2B.
[00277] One or more embodiments of the present invention may involve a receiver-side device that includes a configuration similar the configuration of receiver-side device 1300 and is configured to handle jitter in multimedia communication that includes voice and video. Further, one or more embodiments of the present invention may involve a delay insertion control and video compensation control process that is similar to the delay insertion control process slκmn in the example of Fig. 12B
[00278] As can be appreciated from the foregoing, embodiments of the present invention may effectively handle jitter in packet communication without depending on a transmitter-side voice activity detector ( VAD) or a fixed jitter buffer scheme. Using a receiver-side silence detector for delay insertion control instead of only for buffer overflow control, embodiments of the present invention may accurately insert delays without unnecessarily inserting delays into voice packets Advantageously, choppy voice may be reduced, and voice quality may be
ensured. Further, embodiments of the present invention may be utilized in video communication and/or multimedia communication
[00279] D. Di vitas Description Protocol (DDP)
[00280] One or more embodiments of the present invention include a lightweight protocol over SIP that will efficiently transport information between the server and the client and will work independent of the hardware and software platforms.
[00281 ] Architecture of DDP. DDP has been architected taking the following factors into consideration:
[00282] Independent of server and client hardware and OS: The structure and format of the protocol (DDP) is such that DDP is agnostic of the server or handset hardware platform as well as the operating system running on both of the platforms. In accordance with one or more embodiments of the present invention, the protocol is architected and designed to run on any server or handset hardware platform and is independent of the Operating System/SW platform running as well For example, DDP may run on Linux, Syrπbian, Windows Mobile 5.0, etc. In summary, no special adapter layer needs to designed or developed every time this module has to be ported on to a new hardware or software platform.
[00283] Decoupled from control plane protocol: DDP has been architected such that is can be used with any of the control plane technologies that is use on a given platform - i.e., SIP,
H.323 etc,
[00284] Independent of transport protocol: Designed to he efficient when used over both
UDP and TCP. Has an optional module to ensure a level of reliability and performance (using
ACK/ΗACK and a windowing mechanism) if being used over a transport layer than is best effort. This reliability module removes the burden on higher layer application to worry about guaranteed delivers' especially in environments with, high packet loss.
[00285] Generic and application-unaware: DDP will be used for a wide range of application ranging from critical control plane messages with strict real time requirements to application thai need to transfer large amounts of data between the server and the client. Optional module within DDS* enables the application to transfer files and buffers between the server and client.
The protocol also does not care about the type of the application data - i.e. binary, text.
[00286] Service Priority Level: Enables the scheduling and queuing of messages with different priority levels for application with different delay and service requirements.
[00287] Support for Encryption: Optional module within DDP allows the server and handset to set up a secure tunnel at initialization and all further exchange of DDP messages are
encrypted providing a level of security for applications that need encryption. This will still allow applications to exchange unencrypted messages for such applications that do not need encryption.
[00288] Built-in Session Management; Has specific control messages to initialize and maintain the session between the server and the client
[00289] Independent of the medium: The protocol Is independent of the medium over which the client is connected to the server The session could be over WiFi, cellular data channel or wired Ethernet.
[0029Oj Fig 6 A shows an overview of a DDP architecture that is fabricated in accordance with one or more embodiments of the present invention. As shown in Fig, 6 A, DDl* is a session layer application that tuns over SlP protocol. The encrypted application layer information that is transmitted between client and server is used to affect handoff decisions, provide session persistence for data applications such as, for example and without limitation, email or SMT P Rg. 6A gives a high level view of the different modifies that make up DDP. Here is a brief description of the different modules within DDP in accordance with one or more embodiments of the present invention-
[00291] i DDP Message Handler; This is comprised of the parser and the message- formatting module The parser is responsible for checking the validity of a received DDP message and extracting the various information pieces before invoking the callback handlers. The formatting module takes the information from a higher-level application and formats the DDP message before the DDP message is packed in to a signaling message packet [00292] ii Session Management. An inbuilt mechanism to evaluate the health of the DDP session between two peers and mechanisms for informing the registered applications if the session fails.
[00293] ϋi. DDP Scheduler. Provision for having different priority levels for DDf* messages based on the application recμύrements.
[002cM] iv. Reliable DDP module; Support for guaranteeing reliable delh ery of DDP messages depending on the application requirements
[00295] v. DDX (Divitas Data Transfer) module- The module that uses DDP messages for transferring files and data buffers between peers. The DDX module will work independent of the tile format or the buffer contents and has mechanisms for error cheeking and confirmation of deliver}'
[002%] vi. DDPS: The module in DDP that encrypts and decrypts the DDF contents before they are inserted in the signaling packets. DDP has a protocol for establishing the secure
DDP tunnel between 2 Divitas peers,
[00297] Fig 6B shows the exchange of DDP messages during the initialization of a client when a user logs on to one of the devices in accordance with one or more embodiments of the present invention,
[0029Sj In accordance with one or more embodiments of the present invention, DDP is a
Layer 4 or an application layer protocol. DDP can use TCP, UDP or TLS for transport. Similar to SlP or SDP, DDP is a text-encoded protocol ϊn accordance with one or more embodiments of the present invention, a DDP message comprises a sequence of lines or fields wherein each line of field begins with a single lower case letter which denotes the type of information that is being conveyed; the rest of the line or field contains pieces of information associated with a function or method. In accordance with one or more embodiments of the present invention, there can be multiple lines or fields with the same starting name or type. In accordance with one or more embodiments of the present invention, each DDP message comprises a set of mandatory lines or fields and optional lines or field, depending on the specific type of DDP message being sent. If any of the mandatory lines are missing, a parser will reject the DPP message. Optional lines that the parser cannot understand are skipped over. This allows for backward compatibility and interoperability between different versions of software. Here is an example of a DDP message.
[00299] vθ.0.0.1
[00300] o=== server
[00301] r=data 2
[00302] c-ext 4444
[00303] e~pief cell wit! gprs sms wka 5 cka 10 pwd 1200 whys 20 chys 60
[00304] c-wifi rssiio 30 rssihi 60 chlo 30 chhi 50
[00305] c=qos delaylo 50 delay hi 100 losslo 1 losshi 10 jitterϊo 30 jitterhi 50
[00306] c=srv ϊntip S 023414444 extip - 1343245032
[00307] c===end
[00308] The DDP message is then added as a message body in a SIP message with a message body type of "application/ddp" or "application/ddps" The DDP body can also be sent with other signaling protocols if required.
[00309] Exemplary applications of DDP in accordance with one or more embodiments of the present invention are described as follows.
[00310] Voice Mobility Voice mobility depends on a lot of factors - the primary one being the WiFi quality experienced by the client. DDP is used to send the WiFi report in real time with information about the AP that the handsel is currently associated with to make mobility decisions. The WiFi report can also optionally contain information about the neighboring APs so that the mobility server can use this information to take preemptive mobility decisions baaed on the predicting the movement of the handset. In addition to the automatic updates based on the WiFi conditions, DDP is also used for user initiated mobility decisions. [00311] Client/Device Management: DDP is used extensively in managing the client and the user experience on the handset. Here are some of the different way in which DDP based control and bulk transfer messages are used for managing the client' a. Device Configuration: Sending device specific configuration to the device during initialization once the device/user have been authenticated b. Mobility Thresholds. WiFi thresholds based on administrator settings for the client to initiate mobility actions. c User information- When a user logs on to one of the clients, the server pushes the user specific information (like extensions, preferences etc ) over DDP. d Device Image Management: Ability to upgrade the handset software over the air is achieved using DDP bulk transfer capability,
[00312] Yoicemail/Eniail download to handset: One of the key differentiator of the Divitas solution is the ability to download soicemails to the handset and manage them at a time of your convenience. The ability to manage voicemails without IVR is possible by proprietary- control messages that interface with the Voicemai! system as well the bulk transfer capability in DDP to transfer the voiceraaϋs to the handset, A similar functionality can also be achieved for Email system where an adapter module can be built to interface with the Email system of choice.
[00313] User Presence Management: DDP messages with the user's preference for voice and text over the different medium is communicated to the server for presence management. This is a key piece of functionality that allows the support of Presence aware calling. The architecture and design of Rendezvous calling is also based on enhanced presence and user preferences - al! communicated over DDP to provide the service Rendezvous calling is designed to provide.
[00314] Instant Messaging The messages for IM are tunneled over a DDP session This allows the IM client on the handset to be unaware of the medium protocol in which the device is operating
[003 ! 5 ] Features and advantages of the present invention may be better understood with reference to the flguies and discussions that follow
[003 lit] Fig 14 shows a prior art example of a cai! flow for establishing a connection between an application client and an application server Consider the situation w-heieiti, foi example, a user of a handset wanfc to employ an application client 1404 to request for a software download 1406 sia a web browser tluυugh a HTTP (hypertext transfei protocol) connection
[003 Pj Before software download 1406 may occur, an HTTP connection may first has'e to be established between application client 1404 and application sen er 1402 At a first step
1408, application client 1404 may send a TCP (transmission control protocol) SYK
(synchronization) to an application server 1402 Λt a next step 1410, application server 1402 may send a TCP SYN-ACK (TCP synchronization acknowledgement) back to application client 1404 At a
step 1412. application client 1404 may send a TCP AOK to application server 1402
[00318] Once an I IT TP connection has been established between application client 1404 and application sener 1402. at a next step 1414. application client 1404 may send an HTTP
Gel to application server 1402 In other words, at step 1414, application client 1404 is sending the uset's request for a software download 1406 to application sener 1402
[00319] I pon receh ing the I ITFP (let, application server 1402 nia> perform a search to locate the requested download, at a next step J 416
[00320] At a next step 1418, once the software has been located, application server 1402 may begin sending the requested software as data packets (e g . ϊ CP data segments > to application client 1404 In sending the requested software file, the software file maj be broken into a plurality of data packets in order to facilitate the process of sending the software file through the network
[00321 j At a next step 1420, upon leceiving the TCP data segment, application client 1404 may send a TCP ACK to application server 1402
[00322 j Steps 1418 and 1420 may be repeated until all of the data packets for the requested software download hav e been sent by application server 1402 to application client 1404
4o
[00323] Once all of the TCP data segments have been sent, then at a next step 1422, application server 1402 may send an HTTP 200 OK to application client 1404. In sending an HTTP 200 OK, application server 1402 is notifying application client 1404 that ail data packets related to the software download request, have been sent.
[00324] Once application client 1404 has received each of the data packets, then application client 1404 may send a notification 1424 to the user informing the user that the download lias been completed.
[00325] For each application client on a handset the method described in the call flow of Fig. 1 may have to be performed by each application, client. Thus, if the handset includes multiple application clients (e.g., video application client, voice application client, instant messaging application client, game application client, virtual reality application client, etc.), an independent channel may have to he established between each application client and its corresponding application server before interaction between the application client and the application server may commence. With multiple applications running on a client, communication between the different applications is not guaranteed. As a result, an application running on a given client may be unaware of the data exchange that may be happening for another application on the same client,
[0032ό] In addition, the method described In Fig. 1 is a cumbersome method that may require each application on a client to be properly configured in order to assure that the application may successfully interact with its corresponding application on a given server within an enterprise. This method could create both security risks and increased complexity- by requiring that a separate network session be allowed for each of the applications that communicate between a client and a server.
[00327] In one aspect of the invention, the inventors herein realized that a single protocol that is independent of hardware (e.g., handset) and software (e.g., video application client, voice application client, instant messaging application client game application client, virtual reality application client, etc.) may he employed to consolidate all of the applications network sessions. In other words, the inventors realized that application clients do not need to establish multiple network sessions with their corresponding application servers, instead, a protocol may be implemented that takes advantage of existing control and transport protocols but is hardware and software Independent, thereby allowing a plurality of application clients to interact with its corresponding plurality of application servers.
4?
[00328] In accordance with the embodiments of the invention., a mobility architectural arrangement is provided by Implementing a DiVitas description protocol (DDP), In an embodiment the DDP may include a DDP client and a DDP server. Embodiments of the invention enable the DDP to efficiently transport data packets between a plurality of application clients on a handset and a plurality of application servers within an enterprise. Embodiments of the invention also enable DDP to be implemented independent of the hardware and software platforms.
[0032Q] In an embodiment of the invention, the DDP is independent of the hardware platform Thus, the DPP may be implemented on dual-mode handsets, personal digital assistants (PDAs), 802. i 1 telephones, and the like In an embodiment of the invention, the DPP is also independent of the software platform, As a result, the DPP may be run on a
Linux* system, a Symbian1* system, a Window iM Mobile 5.0 system, and the like. [00330] In the prior art. the establishment of multiple network .sessions may require multiple channels to be established between the client and the server. In other words, a plurality of "holes'' may be "punched" into the firewall of the enterprise in order to enable the plurality of application clients to interact with their corresponding application servers. In an embodiment of the invention, DDP may be implemented to establish a single secure channel through which interaction between application clients on a handset and application servers within ars enterprise may be conducted.
[0033 Ij With a single secure channel from which a plurality of data traffic may be exchanged, the information that is downloaded onto the handset may be managed b\ the application client Thus, an application client that may require the utilization of information that has already been downloaded does not have to request for the data to be downloaded again Instead, the mobility client with DDP may be able to direct the application client to the storage location of the requested data.
[00332] In an embodiment of the invention, the DDP may be independent of the network in an example, the secure channel established by the DDP may be through Wi-Fi network or a cellular data network, for example This enables DDP to ensure that a network session can be handed off to a separate network, when a user on a client device roams. [00333] In an embodiment, the DDP is built on top of a control protocol and a transport protocol. In a.n embodiment, the DDP may be implemented with any available control protocol (e g , SIP, H 323, etc.) In another embodiment, the DDP may be implemented with any available transport protocol, such as a user datagram protocol (UDP), a transmission control
protocol ( FCP), or a transport layer security (TLS K for example. Thus, the DDP is able to efficient!)1 route data packets and manage connectivity without having to be concerned about the control and/or transport protocol that may be available.
[00334] In an embodiment of the invention, the DDP may include a reliability module (RDDP), which may ensure a level of reliability for the delivery of (he data traffic This module is useful when utilizing a transport protocol, such as UDP, that does not provide reliability. Thus, DDP may provide assurance of a successful transfer and remove the burden of monitoring the data traffic from the application clients,
[00335] In an embodiment of the invention, the DDP may be implemented for a plurality of applications (i.e., application clients and their corresponding application servers). In an example, the DDP may be employed by a simple application that may not require real time exchange of data. In another example, the DDP may be employed by an application that has real time requirements for the exchange of data. Due to the DDP adaptability, applications may be added or removed without impacting the capability and versatility of the DDP. [00336] In an embodiment of the invention, DDP may include a priority message scheduler module which may be configured to schedule and queue data traffic. The DDP may employ the priority message scheduler module to automate the plurality of downloads and uploads that the plurality of applications may need or require
[00337] The features and advantages of the present invention may be better understood with reference to the figures and discussions that follow.
[00338] Fig. 1 5 shows, in an embodiment of the invention, a simple architectural diagram of the DDP invention. In an embodiment of the invention, DDP 1536 is independent of hardware and/or software platforms, In an example, DDP 1536 may be implemented on a plurality of client devices, including, but are not limited to, dual-mode handsets, PDAs, laptops, and the like. In another example, DDP 153t> may be implemented with different operating systems, such as, a Linux® system, a Symbian© system, a Window TM Mobile 5.0 system, and the like. As a result, DDP 153t> may be loaded omo different hardware and/or software platform with minimal modification
[00330] DDP 1536 may be built on top of a control protocol, and a transport protocol In an example, DDP 1536 may be used with different type of control protocols (e g , SIP 1532 and other control protocols 1524) and different type of transport protocols (e.g , UDP 1534, UDP 1528. TCP 1530, TCP 1526, etc). The type of control protocol and/or transport protocol that may be employed by DDP 1536 in order to perform its function may be easily adapted by
DDP Thus, if the control protocol and/or the transport protocol change, DDP 1536 will adapt itself to utilize any combination of available transport and control protocols as required Note that changes to the control protocol and/or the transport protocol do not impact the application layer which may include, but is not limited to. a voice mobility control application client 1506, a device management application 1504, a project management application 1502, a voieemaii/email transfer application 1508. a device image management application 1510, an instant messaging application S 512, and the like
[00340] In addition, DDE* 1 53b, in an embodiment, that is capable of determining the preferred transport protocol to provide the best performance and reliability Thus, the responsibility of identifying the correct transport protocol may be centralized and moved from the plurality of applications to DDP 1536 Sitice all the data traffic between a DDP client and sen er is now handled b> DDP 1530, DDP 1 536 may be able to determine the best transport protocol for rowing data traffic while minimi/ing the possibility of data packet loss [00341 j In an embodiment, DDP 1536 ma\ include one or more modules, such as a DDP with securit) extension module (DDPS module 1522). a priority message schedule? module 1518, a reliable DDP module (RDDP module 15 16). a built-in session management module ] 520, and a Di Vitas data exchange module (DDX module 1 514)
[00342 j In an embodiment, DDPS module 1522 may proskle security functionality to DDP 1536 In an example, DDPS module 1522 may enable a secure channel to be established between a mobility client of a handset and a mobility server within an enterprise With a secure channel, all incoming and outgoing data traffic from the plurality of applications ma\ be routed Ihjough a single secure channel
[00343] In some situations, indi\ idual authentication may have to occur before an application client may be able to interact with its corresponding application server Unlike the prior art, the authentication process may be automated In an embodiment. DPPS module 1522 may include a database, which may include the authentication data required for establishing a connection between an application client and an application server [00344] In an embodiment of the invention, DDPS module 1522 may provide encryption/decryption functionality, thus enabling DDP 1536 to
security foϊ applications that may require the functionality In an example, an important e-mail from application client 1508 is routed from an email server to an email application client on the handset To ensure the security of the email, DDPS module 1522 may encrypt the DDP data packets before sending the packets to the coitesponding application server In another
example, an instant message between two IM clients may be sent in a non-secure manner. Thus, DDP 1536 may route the instant message without employing the DDPS module 1522 to encrypt the data packets sent between the \M clients
[00345 j In an embodiment of the invention, DDP 1536 may include priority message scheduler module 1518, which may be configured to schedule and queue data packets In other words, priority message scheduler module 1518 may be responsible for managing the plurality of different data packets that may be serviced by DDP 1536. In an embodiment, priority message scheduler module 1 518 may establish a policy for handling the incoming and outgoing data packets In an embodiment, priority message scheduler module 151 S may have different priority levels depending upon the originating application, In an example, application A (e g., email) may have no requirement for teal -time delivery of its data packets. However, application B (e g , Presence Management) may be sensitive to time delay and require realtime delivery of the data packets. In a.n embodiment, priority message scheduler module 1 518 may be an optional DDP module hi an example, if DDP 1536 is currently only handling data traffic for one application, then DDP 1536 may not have to employ priority message scheduler- module 15 I S to handle the scheduling of the data packets
[00346] In an embodiment of the invention, DDP 1536 may include a reliable module (RDDP 1516), which may provide a level of assurance for the delivery of the plurality of data packets. To assure delivery, in an embodiment, RDDP 1516 has mechanism to retransmit packets that do not successfully reach their destination within a specified time inten al in an embodiment, if a data packet is not received within a preset time interval, the packet will be retransmitted. . The packet may be retransmitted a specified number of times before notifying the application that the transfer of the packet has failed. With RDDP 1516, DDP i 536 may provide assurance that data packets are being sent and/or received in the order in which the application requires.
[00347] In an embodiment, DDP 1536 may include a DDX module 1514, which may be employed to transport large amounts of data (e.g. image files, log files, etc. ) between the mobility client and the mobility server, In the embodiment, DDX module i 514 includes mechanisms to ensure the data integrity of the data transfers between the mobility client and mobility server, In yet another embodiment of the invention, DDX module 1514 may include mechanisms for confirming completion of the data transfer to the applications.. [00348] In an embodiment of the invention, DDP 1 536 may be implemented for a plurality of applications including, but are not limited to, voice mobility control application 1506,
device management application 1504. project management application 1502, voicemail/email transfer application ! 508, device image management application 1510, instant messaging application 1512. and the Si ke In an embodiment of the
plurality of applications may be divided into two groups
[00349] In the first group, the plurality of applications (e g , voicem ail, email transfer application 1508, device image management application 1510, instant messaging application S 512, etc ) are applications that may tend to send larger tiles, thus DDP 1536 may ernplυ> DDX module i 514 to convert the tiles into smaller data packets that can utilize any of flic other modules within DDP 1536, including 1516, 1518, 1522, and provide assuiance that the data file has been successfully transmitted and that the application has been notified of the completed transfer
[00350 J In the second group, the pliuality of applications (\ oice mobility control application 1506, device management application 1 ^04. project management application 1502, etc ) is usualh applications that may tend to send smaller control messages I dually, applications in the second group tend to be control applications In an example, \ oice mobility control 1506 may enable the mobility client and the mobility server to share mobility status, which may be sent in a single DDP packet
[00351] Fig 16 A shows, in an embodiment, an example of Siow data within a mobility architectural arrangement with DDP may flow between an application client located within a client de\ ice and an application sei vet , which is managed by an enterprise Consider the situation wherein, for example, a user on a client device wants to employ a voicemail client 1602 to reiriex e a voicemail from a \ oicεmail server 1604
[00352] Upon receiving the request from application client 1602.
server lt>04 may initiate a file transfer Voicemail server 1604 may send the file along a path 1650 Upon receiving the file, the mobility sen er may prepare the file to be sent through a secure channel to a mobility client on the client device
[00353] In an embodiment, a sen er DDX module 1608, w hich is within the mobility server, may be employed to convert the file into a format that is compatible with the control and transport protocol of the secure channel In an example, server DDX module 1o08 may convert the file, which may be in a binary format, into a format that can be transported over the SIP protocol \Uo, serser DDX module 1608 may break the file into a plurality of data packets in order to ensure the effectiveness of routing the plurality of data packets through the secure channel
[00354] After initial processing iias completed, server DDX module 1608 may send a first data packet to a server DDP 1616 Server DDP 1616, in an embodiment, may include a server RDDP 1614, which may provide a level of assurance for the delivery of the first data packet. [00355 j Once the first data packet has been received by server DDP 16 S 6, the first data packet may be encrypted. In an embodiment, server DDP 1616 may include a DDPS module, which may encrypt the data packets as required by the application. In an example, simple data packets (e g., instant messages) may be sent without encryption, In another example, important data packets (e.g., a confidential email) may be encrypted before being routed to the requestor.
[00356] From server DDP 1616, the first data packet may be encapsulated as a SLP notify message (as shown in a code example .»70 of Fig. !6B) and sent via the secure channel through a network 1624 to the client device. In an example, the first data packet may be sent through the secure channel by using a server SIP control protocol 1620 and a server UOP transport protocol 1622. The first data packet may be received securely by the mobility client of the cliem device, which may receive data packets through a client UDP transport protocol 1626 and a client SIP control protocol 1628.
[00357] Within the mobility client a client DDP 1632 may receive the first data packet. A client R DDP 1634 may perform a similar check as that performed by server RDDP 1614. Also, client RDDI* 1634 may send a SlP Notify Message with a DDP acknowledgment along a path 1652 through the secure channel to server DDX module 1608. By sending the DDP acknowledgement, client RDDP 1634 may send an assurance from the mobility client to the mobility server thai, data packet has been received. likewise, if server RDDP module 1614 does not receive the RDDP acknowledgement server RDDP module 1614 will retransmit the data packet until the packet has been successfully acknowledged or the maximum number of retries is exhausted.
[00358] In an embodiment, a data packet may be sent and the next data packet may not be sent until a DDP acknowledgement has been received, In an example, server DDX module 1608 may not send a second data packet until a DDP acknowledgement has been received In another embodiment, a fixed number of data packets may be sent and the sending of additional packets would not occur until an acknowledgement is received for one or more of the initial data packets In an example, server DDX module 1608 may send a group of 10 data packets and will be required to wait until at least one acknowledgment is received before it is allowed to transmit an additional data packet.
[00359] Once the mobility client iias sent a DDP acknowledgment to the mobility server, the data packet wili be routed to a client DDX module 1636. ϊn an embodiment, client DDX module 1636 may hold the data packets until all data packets have been received, In an embodiment, server DDX module 1608 may send a message indicating that each of the data packets for the requested file has been sent and that no additional data packet for the file will be forthcoming. Once all of the data packets have been received, then client DDX module S 636 will reassemble the file and notify the voicemail client 1602 that the voicemail file is available
[00360 j As can be seen from Fig. 15 and Hx the architecture of the DDP may provide a single secure channel from which a plurality of application clients may interact with a plurality of application servers By having data traffic flowing through a single secure channel, the architecture of the DDP may provide control by assuring that the data packets are being received, that proper verification has been done in order to acknowledge that all data packets have been received, and that there are no missing data packets ϊn an example, the architecture of the DDP may enable large tiles to be broken up into smaller data packets, which may be sent with the assurance that the acknowledgement may be sent by the receiving side, [00361] Fig 17 shows, in an embodiment of the invention, an example of a call flow illustrating how a secure channel may be established between a client device and a mobility server. In an embodiment, to establish a secure channel, registration may occur. Consider the situation wherein, for example, a user initializes a client device for the first time, [00362] At a first step 1 724, a SiP registration must first be established In an example, a client SlP 1716 may send a SIP registration request through a client UDP 1714 The SIP registration request may be received by a server SlP 1710 through a server L1DP 1712 [00363] Upon receiving the SlP registration request, server SIP 1710 may send a SlP registration response 1726 via server CJDP 1712 and client UDP 1 714 to client SlP 1716. Once the SIP registration has been successfully completed, steps to establish a secure DDP channel are initiated.
[00364] At a next step 1728, a client DDPS module 1718, a module of a client DDP 1720, will send a DDPS session request to a server DDPS module 1708. In an example, the DDPS session request may be routed through client SIP 1716, client UDP 1714, server UDP 1712, server SIP 1710 to server DDPS module 1708.
[00365] Upon receiving the DDPS session request, at a next step 1730, server DDPS module 1708 will send a DDPS session response 1730 to client DDPS module 171 S via server
SiP 1710, server UDP 1 712, diem UDP 1714, and client SIP 1716. Once the secure channel has been established, the user may have to register with the mobility server. To notify the user, client DDPS 1718 may forward the DDFS session response to an application client 1722. [00366] Upon receiving the notification, at a next step ! 732, application client 1722 may send a DDP registration request to a user/device manager 1704 In an example, application client 1722 may send the registration information to a client DDP 1720. Client DDP 1720 may send the registration information through the established secure channel (i e.. through client DDPS module 1718, client SlP 1716. client UDP 1 714, server UDP 1712, server SSP 17 SO, and server DDPS module 1708) to a DDP 1706, which may then route the registration information to user/device manager 1704.
[OO3&7] Upon receiving the registration information, user device manager 1704 may send a DDP registration response to application client 1732, at a next step 1734. Sn an example, user device manager S 704 may send the DDP registration response to server DDP 1706 Server DDP 1706 may send the registration information through the established secure channel (i.e . through server DDPS 1708, server StP 1710, server UDP 1712, client UDP 1714, client SlP 1716, and client DDPS 1718) to DDP 1720, which may then route the DDP registration response to the user of application client 1722.
[00368] In a mobility architectural arrangement with DDP, registration may be a one-time event. In an example, client device will register with the mobility server when the client device is initialized for the first time Since a secure channel has already been established at steps 428 and 430, the user of the client device may be assured that the sensitive DDP registration information is being sent encrypted and through a secure channel, hi an embodiment, nα additional DDP registration may need to occur as long as the secure channel between the client device and the mobility server is maintained. In an embodiment, interaction between application clients on a client device and application servers managed by an enterprise may now be conducted securely through a single secure channel Fig. 18 and 19 show, in an embodiment, examples of how DDP may handle interaction between applications clients on a client device and application servers managed by an enterprise.
[00360] Fig. 18 shows, in an embodiment, a simple call Slow illustrating a situation in which a large file may have to be sent Consider the situation wherein, for example, a client device may need to download the latest software upgrade In an example, an application client 1814 may send a request 1816 for software upgrade to an image manager 1802, which may be responsible for managing the different software images on the server side.
[00370] At a first step 1818, application client 1814 may send a new image request to image manager J 802. In an example, the new Image request may first be sent from client application 1814 to a client DDF 1810 After receiving the new image request, DDP 1810 may send the request through a secure channel to a server DDP 1808. Before being sent to image manager 1802, the new image request ma)' be routed to a device/user manager 1804, which may be responsible for determining which software may need to be upgraded. After device user/manager 1804 has determined which software upgrades the client device may need, device user/manager 1804 may route the new image request to image manager 1802. [00371] Upon receiving the request, the image manager !802 may then send the requested software upgrade (e.g., requested data 1820) to a server DDX module 1806, In an embodiment, server DDX module 1806 may convert the file into a format thai is capable of being sent through the secure channel established between the client device and the mobility server. In an embodiment, server DDX module 1806 will break the large file into a plurality of data packets in order to transport the file through the secure channel.
[00372] At a next step 1822, server DDX module 1806 may send a DDX file transfer start to a client DDX module 1812 via server DDP 1808 and client DDP 1810 In an embodiment, a DDX file transfer start refers to a notification between a server DDX and a client DDX that a file is about to be sent. The DDX file transfer start may include basic information about the incoming file such as, for example, name of the file, file size, number of data packets that may be sent, the application that is requesting for the file, and the like. [00373] At a next step 1824, client DDP 1810 may send a DDX start response to sen, er DDX 1806 In an embodiment, a.n RDDP module within the DDP may be sending the DDX start response.
[00374] At a next step 1826, server DDX module 1806 may send a first DDX data packet to client DDX module 1812. As described in Fig 1.6, the DDX data message may first be sent to server DDP 1808 The DDX data message will be encapsulated as a SIP notify message, in an embodiment, and sent through the secure channel over a SlP control protocol and a UDf* transport protocol. On the client device, the DDX data message may be received by a client DDP 1810, which may then route the DDX data message to client DDX module 1812. [00375] At a next step 1828, upon receiving the DDX data message, a DDP acknowledgement will be sent by client DDP 1810. In an embodiment, the RDDP module within client DDP 1810 will send the DDP acknowledgement to inform server DDX module 1806 that the incoming DDX data message has been received successfully.
[00376] Steps 1826 and 1828 may be iterative steps that may be repeated until all DDX data packets and acknowledgements have been exchanged between the server and client DDX module.
[00377] Once the last DDX data message and DDX acknowledgement have been sent, server DDX module 1806 will send a DDX file transfer end, at a next step 1830, to application client 1814 to notify the application client that all DDX data messages have been sent. In an example, the DDX file transfer end may be sent from server DDX module 1806 to server DDP
1808 to the client device.
[00378] The DDX file transfer end may be received by client DDP 1810, In an embodiment, the RDDP of client DDP I S iO may send a DDP acknowledgement to image manager 1802, at a next step 1832.
[00379] Meanwhile, client DDP 1810 may route the DDX file transfer end to client DDX module 1812, which will notify the application client 1814.
[00380] As can be appreciated from Fig. 18, a new secure channel may not have to be established in order to request the software upgrade. Instead, the request for a software upgrade may be received and handled by the application server without having to establish a new secure channel. As can also be seen. Fig. 18 shows how the architecture of the DDP may be employed to send data traffic in a secure and reliable manner (hat may enable the sender and the requestor the assurance that all data packets for a requested tile have been successfully received.
[00381 ] Fig. 19 shows, in an embodiment of the invention, a simple call flow illustrating a situation in which small control messages, such as those sent by control applications, may be sent. In Fig. 19, the interaction between an application client and an application server may occur without a DDX module.
[00382] Consider the situation wherein, for example, a user of a client device wants to share his or her user presence (e g., available, busy, phone call only, etc ).
[00383] At a first step 1914, a client presence manager 1910 on a client device may send a presence preference setting to a server presence manager 1902. In an example, client presence manager 1910 may send a presence preference setting (as a single DDP data packet) to a client
DDP 1908, which may then send the presence preference setting through a secure channel to a server DDP 1906.
[00384] Upon receiving the presence preference setting, server DDP 1906 may send a DDP acknowledgement, at a next step 1918. In an embodiment, a RDDP module within the DDP
5?
may be sending the DDP acknowledgement. Meanwhile, server DDP 1906 will notify the server presence manager 1902 of the presence preference setting through the device/user manager 1904.
[00385] Consider another situation wherein, for example, the same user wants to discover the presence status of another user.
[00386] At a first step 1922, client presence manager IQIO may send a presence query i c>20 to client DDP 1908, which may send the presence query through the established secure channel to server DDP 1906, Upon receiving the presence query, server DDP 1906 will forward the query through device/user manager 1904 to server presence manager 1902, which may perform the requested query to retrieve the requested information.
[00387] At a next step 192S5 server presence manager 1902 may send a presence response (e.g., requested status data) to client presence manager 1910. In an example, the presence response may be sent from server presence manager 1902 through device/user manager 1904 to server DDP 1906. Then, the presence response may be sent through the secure channel to client DDP 1908, which may then route the presence response to client presence manager 1910.
[00388] As aforementioned, Fig. 18 and 19 show different examples of how DD? may be employed to manage the interaction between a plurality of data applications on a client device and a plurality of application servers managed by an enterprise. A mobility architectural arrangement with DDP establishes a single channel from which each of the application clients and the application servers may interact with one another. Also, the architecture of DDP may he employed to send data traffic in a secure and reliable manner that may enable the sender and the requestor the assurance that all data packets for a requested file have been successfully received.
[00389] Since the mobility architectural arrangement with DDP may now be the center of control, the mobility architectural arrangement with DDP may now coordinate the various activities that a user of a client handset may have previously individually managed In an example, Fig. 18 shows how DDP may be employed in managing the user's experience on the client device including, but are not limited to, software upgrade, device configuration, and user information management. In another example, the DDP may manage a user's presence (as seen in Fig 19} by allowing the user to share his status, thus enabling the system to manage incoming traffic and to allow others to see his or her status. In yet another example, DDP may
manage mobility by allowing the user to roam from one data network to another without having to worn' about session management.
[00390] As can be appreciated by the embodiment of the invention, a mobility architectural arrangement with DDP reduces the security risk by providing a single secure channel from which multiple applications on a client device may be able to communicate with a plurality of applications on an enterprise server. DDP is a versatile protocol that may be advantageously implemented independent of hardware and/or software limitations. Also, DDP is an adaptable protocol that may be manipulated to take advantage of a plurality of control and/or transport protocols.
[00391] E. Di vitas Protocol Proxy (DPF)
[00392] If clients for applications on the mobile handset access the enterprise resources directly, the enterprise firewall needs to be opened for multiple protocols. A method, which is fabricated in accordance with one or more embodiment of the present invention, allows the handset based enterprise applications to make use of existing VoIP related connection in a secure manner
[00393] This invention is implemented by devising a distributed protocol proxy. The distributed protocol proxy may be divided into two parts. One part resides on the mobile handset along with the VoIP client The other part resides inside the enterprise along with the VoIP server.
[00394] As shown in the Fig. 7A-D the handset based VoIP client acts as a server for the different applications running on the handset. This component makes use of existing VoIP related connection (e g. SIP) to send the application pay load across to the enterprise. The server side proxy component is responsible for stripping the payload and making connection to the actual enterprise servers. The client and server side proxy components may further be subdivided into multiple subcomponents. Each subcomponent shall be responsible for proxying one protocol.
[00395] Fig. 7A shows a network architecture in accordance with one or more embodiments of the present invention and includes two network interfaces per host. Two paths are provided through the independent networks, one from interface CO to iSO and another from C 1 to S S In SCTP, these two paths would be collected into an association. [003%] Di vitas "Thin Client" monitors the paths of the association using a built-in heartbeat; upon detecting a path failure, the protocol sends traffic over the alternate path. It may not be necessary for the applications to know that a failover recovery occurred.
[00397] Fail over can also be used to maintain network application connectivity For example- consider a laptop that includes* a wireless 802 11 interface and an Ethernet interface When the laptop is in its docking station, the higher-speed bthernet interface would be preferred, but upon loss of connection (remov al from the docking station), connections would be failed over to the wireless interface Upon return to the docking station, the Hihemet connection would be detected and communication resumed over this interface This is a powerful mechanism for providing high availability and increased reliability [00398] In accordance with one or more embodiments of the present invention, a multi- homing scheme is implemented which provides applications with higher a\ suability than those that use FCP A multi -homed host is one that has more than one network interface and therefore more than one IP address fot which the multi-homed host can be addressed In TCP. a connection refers to a channel between two endpoints (in this case, a socket between the interfaces of two hosts)
[00309] Figs 7B-D show how a thin client along with a counterpart of the thin client on the server has in affect created an efficient transport mechanism for conveying state information between handset and the server in accordance with one or mom embodiments of the present invention Λn example of an e-mail application (i e , SMTP) is shown that uses the SIP - NOTIFY method to tunnel application layei packets without {he knowledge of the SMTP application This has advantages where the presentation la\er application on the client does not have to be changed to pro\ ide session persistence
[00400] Ad\ antageously. using the above method for mobility applications, the enterprises may achieve a more secure and eas> to manage enterprise mobility I his method also enables VoIP to extend their mobility solution to different enterprise applications [00401 ] Features and advantages of the present im cntion may be better understood with reference to the figures and discussions that follow
[00402] Fig 20 is a prior art example of an architectural arrangement in which each application on a handset is connected individually to a corresponding application server within an enterprise A handset 2000 may include a plurality of application clients including, but are not limited to, a Di Vitas client 2002, a CRM (customei relationship management) application client 2006, and a mail application client 2008 The application clients may be independent of one another or may interact with one another via application protocol interfaces (APIs) In an example, application clients 2006 and 2008 may be interacting with DiVi ta_« client 2002 via an API 2010 and an API 2012, Respectively
00
[00403] The application clients in handset 2000 may interact with application servers within an enterprise 2090. Enterprise 20^0 may include a plurality of application servers including, but are not limited to, a Di Vitas server 2022, a CRM application server 2026. and a mail application server 2028. The application servers may be independent of one another or may interact with one another via APIs In an example, application servers 2026 and 2028 may be interacting with Di Vitas server 2022 via an API 2030 and an API 2032, respectively. Note that the purpose of the APIs is to enable the application to interact with one another However, since each application is independent of one another, the interaction via the APIs is optional [00404] Consider the situation wherein, for example, a stockbroker on handset 2000 may be communicating with his client via Di Vitas client 2002. While conversing with his client, the stockbroker may want to have his client's portfolio readily available, hi this example, the stockbroker may have to establish two different sessions. The stockbroker may establish a first session to enable him to converse with his client via Di Vitas client 2002 To bring up the portfolio, the stockbroker may establish a second session by employing (!'RM application client 2006 to interact with CRM application server 2026, which is located behind a firewall 2040 within an enterprise 2090
[00405] In a typical secure sockets layer (SSL) virtual private network (VPN) environment, for each channel that may have to be established, a network administrator may have to establish different configuration, in order to establish two different sessions, two separate secure channels may have to be established, in an example, a new mail application client has been added to a handset. In order to communicate with the mail application server, which is located within the firewall of an enterprise, the network administrator may have to create a new secure channel. Thus, in a typical SSL VPN environment, a user may have to establish multiple sessions, which may require multiple sign-cm and may cause the enterprise to be more susceptible to security risk. The SSL VPN environment is not only inconvenient for the user but this type of environment may also recμύre more human resources to manage the security of the enterprise's network environment
[00406] To minimize the number of secure channels that may be created, an Internet Protocol (IP) Security Gateway may be employed instead of an SSL. In an IP Security VPN environment, one or more application clients on. a handset may interact with application servers via one secure channel by traversing through an IP Security Client 2014 and an IP Security Gateway 2030, To establish the secure channel, the user may first have to provide authentication data (e.g., user name, password, etc.). Once the secure channel has been
established, the user may also be burdened with the responsibility of authenticating each time a different application client is utilized. In other words, each application client may be indi\ iduaiiv configured to communicate with its corresponding application server via a different IP address
[00407] In an example, CRM application client 2006 wants to interact with application server 2026 If a secure channel 2084 has not been established, then the user may ha\c to first provide authentication data Once .secure channel 2084 has been established, the ut>er may then have to provide additional authentication data in order to enable CRM application client 2006 to interact with CRM application scivci 2026
[00408] In addition, a new secure channel and re-authentication mav ha\e to occur each time a session is dropped In an example, if a user i& mobile while in a session, the user ma> encounter a risk of being accidentally dropped from a session if the connection is lost hor example, a user, connected via a Wi-Fi network, may traverse outside of the Wi-Fi network
The session may be dropped and the user may
e to establish another session, such as a cellular connection, for example ^s a result, the usci may become burdened with the inconvenience of establishing a new session and also may become frustrated with the limited mobility
[00409] Tn show how an application client may interact with an application server, prior art
Fig 21 is provided Fig 21 is a prior art flow chart illustrating the method for enabling an application client to communicate with an application server in an IP Security VPN environment Hg 2] is discussed in relation to Hg 20
[00410] Consider the situation wherein, for example, a user of handset 2000 wants to employ mail application client 2008 to send an email
[004 } 1 ] At a first step 2102, email data traffic is sent to the application server In an example, mail application client 2008 may send email data packets to mail application server
2028 within enterprise 2O0O
[00412] Λt a next step 2104, the email data traffic is reeeh ed by the JP Security Client
2014, which may perform a check to determine how to route the traffic In other words, IP
Security Client 2014 may analyze each packet to deteimine if the packet is intended foi enterprise 2090 IP Security Client 2014 may identify the recipient of the packet by analyzing the IP address and the port number that is located within the packet
[00413] If the recipient of the email data traffic is not one of a plurality of application servers within enterprise 2090, then at a next step 2106, IP Security Client 2014 may eithei
02
drop the traffic or may direct the email traffic to a server, which is not located inside enterprise
2090 How an email traffic that is not intended for an application server within enterprise 2090 is handled may depend upon how IP Security Client 2014 may have been configured to handle the non-enterprise data traffic
[00414] If IP Security Client 2014 determines that the data traffic is intended for an application server that is located within enterprise 2090, then at a next step 2108, IP Security
Client 2014 may encrypt each data packet before forwarding the data packet The piocess of encryption each data packet may require handset 2000 to have sufficient CPtr processing power Further, the requirement that each data packet he encrypted in an IP Secuiity VPK environment may cause iatencv issue in a voice communication situation, such as a Voice over
IP (VoIP) telecommunication session In other words, voice quality during the voice communication session may be severely degraded resulting in a bad voice communication experience (e g . echo in the background, inaudible conversation, etc )
[00415 j At a
step 2 i 10. IP Security Client 2014 ma> then send the encr\pted traffic to the intended application SCTVCJ along secuic channel 2084 As mentioned above, a secure channel has to be created each time a new application is being employed In an example, IP
Security Client 2014 may send the encrypted traffic through network 2050 and firewall 2040 to
IP Security Gateway 2030 of enterprise 2090
[00416] Λt a next step 2 J 12, IP Security Gateway 2030 may perform a check to determine how to route the traffic Similar to IP Security Client 2014, IP Security Gateway 2030 may analyze each packet to determine if the packet is intended for enterprise 2090
[004 i 7] If by chance the data packet \% not an encrypted IP security packet has been received, at a next step 21 i 4. IP Security Gateway 2030 may drop the packet
[00418] If the data packet is an encrypted IP security data packet, then at a next step 2116, iP Security Gateway 2030 may decrypt the traffic
[004 !0] Once the packet has been decrypted, IP Security Gateway 2030 may then analyze the packet to identify the IP address and port number of the reeeh ing application server Λt a next step 2 J 18, LP Security Gateway 2030 may forward the data packet to the appropriate application sener (e g , mail application server 2028)
[00420] The method described in steps 2102 through 2118 is a continual process and may be performed for each packet that is being Ssc-πt by an application client
[00421] There are several disadvantages to the prior art In an example, a different configuration may have to be perfotmed for each new application client that may be added to a
03
user's handset Λs new application client is added, the management of the various different application clients and their corresponding application servers may result in a more complex networking environment, which may become costh to maintain Λbo, users become burden with the responsibility of performing multiple authentications, thus recjiiiring the users to remember a plurality of authentication data Fmther, the benefit from operating within an IP Security YPN environment is diminished by requiring data traffic to be encrypted resulting in an increase cost in hardvtaie (e g , handset has to have sufficient CPl! processing power) and increased latency In addition, the user may become frustrated with the limited mobility that may be provided each time a session us lost and the user has to re-establish the connection and re-authenticate
[00422] In one aspect of the invention, the inventors herein realized that the prior art architectural arrangement of multiple authentications and/or multiple secure channels may be consolidated to create a single sign-on environment
[00423 j In other words, the im entors realized that by configuring each application to direct its data traffic through a single application {e g , DiYitas client) and a single set vet Ce g , Di Vitas sener), data traffic from a plurality of applications may be sent via a single secure channel without requiring the user to perform multiple authentications ϊn addition, session loss max be substantially reduced without sacrificing mobility
[00424] In accordance with the embodiments of the invention, a mobϋit\ architectural anangeraent is presided by implementing a Di Vitas protocol proxy (J)PP) In an embodiment, the DPP mas include a client DPP and a server DPP
[00425] In an embodiment of the invention, the handset may include a mobility client (e g , DiVitas client), which may include a client DPP to manage the connectivity between the handset and the mobility server (e g , Di Vitas server) In an embodiment of the invention, the mobility server may include a server DPP to manage the connectivity between the mobility server and the handset In an embodiment of the invention, the client and server DPP may include a plurality of sub-dient/server DPPs for managing different types of protocols (e g , SlP, SMTP, etc )
[00426 j In an embodiment of the invention, a DPP enables the establishment of a single secure channel from which each application client may interact with its corresponding application server Since each application is routing its data traffic through a common DPP, the DPP mav now manage connectivity between the handset and the mobility server Connectivity infoimation may include establishing a secure channel between the handset and
04
the mobility server via a control protocol, such as SlP (session initiation protocol > Connectivity information may be employed to determine when and how to connect the handset In addition, connectivity information may also include when to perform a handoff from one network to another network Ce g , from a Wi-FI network to a cellular network), thereby enabling a seamless transition between different networks
[Q0427] The features and ad\ antages of the present invention may be better understood with icferencc to the figures and discussions that follow
[00428] Fig 22 shαus, in an embodiment of the im ention, a simple block diagram of a mobility architccluia! aπangement In a mobility architectural arrangement 2200, a handset 2202 is interacting with a DiVitas server 2218 (e g , mobility seryer) within an enterprise 221t> Handset 2202 may include a Di Vitas client 2204 Ce g . mobility client) and a plurality of application clients «2206 and 2208) In an embodiment of the invention, Di Vitas client 2204 may include a client DPP to manage the connectivity between the handset and the mobility sen er
[0042Oj Unlike the ptiot art. application client 2206 and application client 2208 arc not configured to directly interact with their corresponding application servers (2220 and 2222) Instead, the various different configurations for each of the application clients ma> be simplified, in an embodiment, to direct ail data {raffle to a single local IP host 2210 (e g „ IP addtess of 127 0 0 J ) that is associated with Di Vitas client 2204 In other words, data traffic from application clients 2206 and 2208 may now be configured to be routed to Di Vitas client 2204 via APIs 2212 and 2214 From Di Vitas client 2204, all data traffic may then be routed through DiVitas server 2218 within enterprise 22Ui via a network 2224 (e g , internet) In an embodiment of the invention. DiVitas server 2218 may include a ^ener DPP to manage the eonneetk ity between the handset and the mobility server Once DiVitas server 2218 has received the data traffic, DiVitas server 2218 may then route the traffic appropriately to the corresponding application server (2220 and 2222} via an API (2232 and 2234) [00430] Consider the situation % herein, for example, a user of handset 2202 wants to send an email by employing application client 2206. Since application client 2206 has been configured to send all data tiaffic to local host 2210, the data traffic from application client 2206 is sent via API 2212 to local IP host 2210, which is associated with DiVitas client 2204 [0043 Ij Upon receiv ing the Uaffic from application client 2206, DiVitas client 2204 ma> encapsulate the traffic inside a SlP Notify Message using a DiVitas Data Exchange (DDX) As discussed herein, DDX refers to a protocol for uansporting data packets between a handset and
05
a server. In encapsulating the data packet, the DDX add a new tag which add information about the application client that U sending the data traffic.
[00432] Unlike the prior art, not all data packets are encrypted , Instead, whether or not a data packet is encrypted may depend upon the preference as dictated by the application client. In an embodiment of the invention, the newly added DDX is encrypted. Once the data packet has been encapsulated inside the SIP Notify Message, the encapsulated data packet may now be forwarded along a secure channel 2250, which include traversing through network 2224 to be received by Di Vitas server 2218. Note that, if the enterprise is protected by one or more security modules (e.g , firewall 2226), then the data packet may also have to traverse through one or more security modules.
[00433] Once the data packet has been received by Di Vitas server 2218, Di Vitas server 2218 may employ the DDX tag to retrieve the location of the application server. In an example, the DDX tag may include an identitlcation number (e.g., MAC address, port address), may indicate which application server (e g , application server 2220) within the enterprise is the intended recipient of the data packet.
[00434] In an embodiment, a mobility architectural arrangement may manage the connectivity between the handset and the mobility server In an embodiment, the mobility architectural arrangement may employ a control protocol that is common!}- utilized by a handset, such as SIP for example,
[00435] In a mobility architectural arrangement, the user may only have to perform the manual authentication once in order to establish the secure channel. In other words, once a secure channel has been established between the handset and the mobility server, another secure channel does not have to be established each time an application client (2206 and 2208) wants to interact with an application server (2220 and 2222).
[00436] In an embodiment, the mobility architectural arrangement may also include a database, which may include authentication data for each application client. Thus, each time a different application client is employed., in an embodiment, the mobility architectural arrangement may utilizes the authentication data that is specific to the application, which may be stored in the database, to automatically authenticate the user From the perspective of the user, the mobility architectural arrangement is essentially a single sign-on environment. [00437] Advantageously- the mobility architectural arrangement substantially streamlines the time and effort a network administrator may have to spend in configuring each application client. Instead of having to create a new secure channel each time a new application client is
added to a handset the network administrator ma> substantially eliminate this process by just configuring each of the application clients, to interact with a local host Further, with a single sign-on, the network administrator may be able to substantially reduce the time and cost associated with managing security
[00438] The mobility architectural arrangement may be implemented as a rich or thin client Fig 23 shows, m an embodiment of the invention, a block diagram illustrating the mobility architectural arrangement as a rich client As discussed herein, a rich client refers to a mobility architectural arrangement in which the client DPP and server DPP not only manage the various different applications but may also pun ide .support foi at least one or more application client functionality {e g , a voice application client an instant messaging application client, email application client, etc )
[0043° J Consider the situation wherein for example, a user of a handset 2302 wants to employ a mail application client 2310 (e g , Microsoft® Outlook, etc ) to retrieve an e-mail from a mail application server 2326 (e g , Microsoft®
Server, etc ) that is located within an enterprise 23 I 8 Fig 23 will be discussed in conjunction with Fig 24 Fig 24 shows, in an embodiment of the im ention, a simple Oow chart illustrating an example of a method for employing a mobility architectural arrangement
[0044Oj M a first step 2402, application client may send data traffic to a focal host of a Di Vitas client In a mobility architectural arrangement, application client 2310 has been configured to route its data traffic through a local host 2308, which is located within a Di Vitas client 2304 In an example, application client 2310 may send an SM I P (simple mail transfer protocol ) data packet 2312 over TCP-IP to DiVitas client 2304 SMTP data packet 2312 may be received by an SMTP proxy client 2306 (e g , sub-client DPP), which is located at DiVitas client 2304
[00441 ] In an embodiment, a client DPP may include a plurality of sub-client DPPs fhe type of proxy client that may be employed to handle the data traffic niay depend upon the type of application client In an embodiment of the invention, the data packet may include a port number, which is unique to an application client In an example, SMTP data packet 23 12 includes the following data 127 0 0 1/25 in this example, the nurabei 127 0 0 1 is an IP address, which is specific to local host 2308 and the number 25 refers to a port number, which in this example is associated with SMTP pioxy client 2306
[00442] At a next step 2404, the data traffic mav be encapsulated as a SIP Notify Message with a DDX tag In øthei words, upon receix ing data packet 2312, DiVitas client 2304 may
0?
reformat SMTP data packet 2312 into a SIP data packet 2330 (such as a SlP Notify Message) that is transferable over the handset's control protocol, such as SIP In an embodiment of the invention, SIP data packet 2330 may include the original data packet (e g . data packet 2312} with a DDX header 2330a and a SlP header 233Ob As aforementioned, the DDX header may include a unique identification number that is unique to an application sen ei In an embodiment of the invention, the unique identification number may be generated based on the port number that was included in the SVtTP data packet In an embodiment of the invention, an additional tag may be included in the formatted data packet to identify how the formatted data packet may be transported In an example, transport protocol tag 233Oc ma> be a UDP-IP transport tag
[00443 ] In an embodiment of the invention, one or more parts of SIP data packet 2330 ma> be encrypted In an embodiment, the DDX part is encrypted even if the rest of the data packet is not
[00444 j At a
step 2406, the Di Vitas" client may send the data packet to the Di Vitas server Once data packet 23 i 2 has been reformatted into SlP data packet 2330 (e g , encapsulated as a SIP Notify Message), SlP data packet 2330 may be sent via a secure channel 23SO through a network 23 14 and/or a firewall 2316 to a Di Vitas server 2320 [00445] M a
step 2408, the DiVitas server may check to determine if the incoming data packet is a SlP Notify Message If the incoming data packet is not a Sip Notifv Message, then at a next step 2410, the data packet may be dropped
[00446] However, if the incoming data packet is a SlP Notify Message, then at a next step 2412 the Di Vitas server may identify the intended proxy server by checking the DDX tag In an embodiment, the DiVitas server may have to decrypt the DDX packet in order to read the information stored in the DDX packet In an example, based on the unique identification number in the DDX tag, Di Vitas server 2320 knows to route data packet 2330 to SM TP proxy server 2322 In an embodiment of the invention, a server DPP may include a plurality of sub- server DPPs in an embodiment of the invention, the type of proxy server that may handle the incoming traffic may depend upon the type of data traffic
[00447] At a next step 2414, the data packet may be Touted to the ptoxy server Since SIP data packet 2330 is an SVlTP data packet, formatted data packet is handled by SMTP proxy server 2322 {e g , sub-server DPP), which is located inside DiVitas burvar 2320 [00448] At a next step 2416, the data packet is routed to the intended application server In an embodiment of the invention, SMTP pioxv serx er 2322 may conx eri SIP data packet 2330
08
into a format that is acceptable by the receiving application server. In an example, SIP data packet 2330 may be converted from a SiP notify message into an SMTP data packet 2328. Also, the DDX part may be dropped. Further, the transport protocol may be changed from UDP-IP to TCP-IP, which may be better employed to deploy email data traffic to the respective application server (e.g., maii application server 2326} via API 2332. [00449] The method steps described in Fig 24 does not show the encryption and/or decryption of a data packet. In an embodiment, the data packet may be sent without being encrypted. The requirement for encryption may be- optional and may depend upon the user's requirement. In an embodiment, part or the entire data packet may be encrypted. In an example, the DDX part may be encrypted but the rest of the data packet may remain unencrypted The optional encryption enables less processing power to be utilized and a decrease in latency that is usually associated with encrypted data packets. [0045Oj As can be seen from Fig. 23 and 24, the rich mobility architectural arrangement may act as a mobility manager enabling application clients of a handset to interact with application servers within a single sign-on environment. Further, the rich mobility architectural arrangement may include functionality for converting data packets from a variety of applications into data packets that are capable of being transported by the control protocol and transport protocol that is specific to the secure channel that has been established [00451] In an embodiment of the invention, the mobility architectural arrangement may be implemented as a thin client, as shown in Fig 25. In a thin mobility architectural arrangement, the client DPP and the server DPP may be employed only as mobility managers (e.g., manage the connectivity for the applications) and may not provide support for at least one or more application functionalities
[00452] Consider the situation wherein, for example, a user of a handset 2500 wants to call a friend. The user may employ a telephone application client 2508 (e.g.. VoIP, etc.) to make his telephone call. Assume in this example that a secure channel 2550 has already been established between a Di Vitas client 2502 and a Di Vitas server 2518, which is located within enterprise 2530.
[00453] To establish the telecommunication session, telephone application client 2508 may send a data packet 2512 (e.g., S1P/UD-IP) to a local host 2510 within Di Vitas client 2502. As mentioned above, a plurality of proxy clients may reside within Di Vitas client 2502 to support the various different application clients. In an example, a SIP proxy client 2504 may be
located within DiVitas client 2502 to handle data packets from telephone application client 2508
[00454] Upon receh ing data packet 2512. SlP prow client 2504 may analyze the data packet to determine how to route the packet As aforementioned, the data packet that may be sent to a DiYitas client may include; a port number (c g , ς0o0, etc ) that ma) be unique to an application server With this information, DiVitas client 2502 may route data packet 25 12 through network 2514 and firewall 2528 to DiVitas server 2518 in an embodiment, a data packet does not have to be com cited if the data packet is already in a format that is routable bv a Diλ'itas client In an example, data packet 2512 is in a SIP, L'DP-IP format, which is the format that DiYitas client 2502 may employ to route its data traffic
[00455] In an embodiment, a plurality of proxy setvet may teside within a DiVitas server In an example, a SlP prow setset 2532 may reside within DiYitas server 2518 to manage the incoming data traffic from telephone application client 2^08 Since data packel 2512 has been sent from telephone application client 2508, the data packet is handled
SIP proxy server 2^M Upon receiving data packet 2512, SlP proxy seivei 25 >2 may forward data packet 2512 along a path 2522 to a destination telecommunication device (e g , telephone, etc ) via a telephone gatew ay 2520 (e g , PSTN. GSM, CDM Λ, etc } Once a telecommunication session has been established between handset 2500 and the destination telecommunication device the other data packets 2530 (e g , RTP data packets, etc ) that may be sent by telephone application client may be sent along path 2560 through secure channel 25^0 to DiYitas server 25 S 8 without having to go through DiVitas client 2502
[00456] In a thin mobility architectural arrangement, the purpose of establishing a telecommunication session with the aid of a DiVitas client is to enable the application client to take advantage of the mobility functionality of the DiYitas client In other words, a control center has been established between the DiYitas client and the DiYitas sener to monitor the connectivity of the application client By establishing this relationship, the DiVitas client and the DiVitas server may be able to share its connectivity status and be able to seamlessly handle roaming when the situation arises
[00457J In an example, the user in the above situation is cυπently connected thiough a Wi- Fi network During the telephone conversation, the user may roam outside of the Wi-Fi network In the prior art, the connection may be dropped and the user may have to redia! However, m a mobilitv architectural arrangement, the connectivity status of the user's handset
has been monitored and the Di Vitas client and Di Vitas server may perform a seamless network switch (e.g., from Wi-FI to a cellular network) without the user being aware of the change, [00458] Advantageously, a thin mobility architectural arrangement may he implemented by an enterprise that may have already invested a large sum of money into a plurality of application and may only need a mobility manager. Thus, the enterprise may be able to take advantage of the mobility manager capability of the mobility architectural arrangement without having to restructure its telecommunication infrastructure,
[0045Q] As can be appreciated from embodiment of this present invention, the mobility architectural arrangement with DPP provides a mobility manager capable of streamlining the telecommunication infrastructure, In other words, the mobility architectural arrangement provides a single sign-on environment, In an example, instead of multiple secure channels into an enterprise, the same functionality may be achieved with a single secure channel. With a single sign-on environment, the cost and effort of managing the telecommunication infrastructure may be substantially reduced. Further, the mobility architectural arrangement enables connectivity to be monitored and seamlessly handled without negatively impacting the user's telecommunication experience. [00460] F Conclusion
[00461] While this invention has been described in terms of several preferred embodiments, there are alterations, permutations, and equivalents, which fall within the scope of this invention. It should also be noted that there are many alternative ways of implementing the methods and apparatuses of the present invention. Furthermore, embodiments of the present invention may find utility in other applications. The abstract section is provided herein for convenience and, due to word count limitation, is accordingly written for reading convenience and should not be employed to limit the scope of the claims. It is therefore intended that the following appended claims be interpreted as including all such alternations, permutations, and equivalents as fall within the true spirit and scope of the present invention.
Claims
CLAIMS What is claimed is. i An apparatus for canceling a signs! comprising' an identification code (ID code) generator configured to generate an ΪD code, an ID code injector configured to inject the ID code into at least one of the signal and a processed signal to produce a convolved signal the processed signal resulted from a processing of the signal; an ID code detector configured to detect at least one of the convolved signal a transformed signal and a transformation of the convolved signal, the transformed signal resulted from the transformation of the convolved signal; and an arithmetic function configured to remove at least one of the convolved signal and the transformed signal.
2. The apparatus of claim 1 wherein the ID code includes a pseudorandom noise signal.
3. The apparatus of claim \ wherein the ID code includes a signal that is unperceivable to human ears.
4 The apparatus of claim 1 further comprising a noise remover configured to remove a background noise from the signal to produce the processed signal, wherein the processing of the signal is performed by the noise remover.
5. The apparatus of claim t further comprising a transformation module configured to transform, according to the transformation of the convolved signal detected by the ID code detector, a copy of the convolved signal into a copy of the transformed signal.
6. The apparatus of claim 5 wherein the transformation module includes a delay function, and the transformation of the convolved signal includes a delay of the convolved signal.
7. The apparatus of claim 5 wherein the arithmetic function is configured to subtract the copy of the transformed signal from a combined signal that includes the transformed signal,
8. The apparatus of claim 7 wherein the signal represents a far-end signal received from a remote party in a communication arrangement, and the combined signal further includes a near-end signal received from a local microphone in the communication arrangement
9. A communication system comprising: an identification code (ΪD code) generator configured to generate an ΪD code, an ID code injector configured to inject the ID code to at least one of the signal and a processed signal to produce a convolved signal the processed signal resulted from a processing of the signal;
an ID code detector configured to detect at least one of the convolved signal, a transformed signal, and a transformation of the convolved signal, the transformed signal resulted from the transformation of the convolved signal; and an arithmetic function configured to remove at least one of the convolved signal and the transformed signal.
10, The communication system of claim 9 wherein the ID code includes at least one of a pseudorandom noise signal and a signal that is un perceivable to human ears, i 1. The communication system of claim 9 further comprising a noise remover configured to remove a background noise from the signal to produce the processed signal wherein the processing of the signal is performed by the noise remover.
S 2. The communication system of claim 9 further comprising a transformation module configured to transform, according to the transformation of the convolved signal detected by the ID code detector, a copy of the convolved signal into a copy of the transformed signal. 13 The communication system of claim 12 wherein the transformation module includes a delay function, and the transformation of the convolved signal includes a delay of the convolved signal
J 4. The communication system of claim 12 wherein the arithmetic function is configured to subtract the copy of the transformed signal from a combined signal that includes the transformed signal .
15. The communication system of claim 14 wherein the signal represents a far-end signal received from a remote party in the communication system, and the combined signal further includes a near-end signal received from a local microphone in the communication system, i 6. The communication system of claim 9 wherein at least one of the ID code generator, the ID code injector, and the ID code detector is implemented in a user device, the user device representing at least one of a telephone, a mobile phone, and a teleconference device.
17. The communication system of claim 9 wherein at least one of the ID code generator, the ID code injector, and the ID code detector is included in software that is downloaded into a user device.
18. The communication system of claim 9 wherein at least one of the ID code generator, the ID code injector, and the ID code detector is implemented in a server device in a com m uni cati on network.
} 9. The communication system of claim 9 wherein at least one of the ID code generator, the ID code injector, and the ID code detector is included in software that is downloaded into a server device.
20. The communication system of claim 9 representing a user device, the user device representing at least one of a telephone, a mobile phone, and a teleconference device
21 . A method for canceling a signal comprising, generating an identification code (ID code), injecting the ID code to at least one of the signal and a processed signal to produce a convolved signal, the processed signal resulted from a processing of the signal; detecting at least one of the convolved signal, a transformed signal, and a transformation of the convolved signal, the transformed signal resulted from the transformation of the convolved signal; and removing at least one of the convolved signal and the transformed signal .
22. The method of claim 21 wherein the ID code includes at least one of a pseudorandom noise signal and a signal that is unperceivable to human ears,
23. The method of claim 2 i further comprising removing a background noise from the signal to produce the processed signal, wherein the processing of the signal represents the removing the background noise from the signal
24. The method of claim 21 further comprising transforming, according to the transformation of the convolved signal, a copy of the convolved signal into a copy of the transformed signal
25. The method of claim 24 wherein the transforming the copy of the convolved signal includes introducing a delay into the copy of the convolved signal, and the transformation of the convolved signal includes a delay of the convolved signal.
26. The method of claim 24 further comprising subtracting the copy of the transformed signal from a combined signal that includes the transformed signal,
27. The method of claim 26 wherein the signal represents a far-end signal received from a remote party in a communication arrangement, and the combined signal further includes a near-end signal received from a local microphone in the com muni cation, arrangement,
28. The method of claim 21 further comprising implementing at least one of the generating, the injecting, and the detecting in a user device, the user device representing at least one of a telephone, a mobile phone, and a teleconference device.
29. The method of claim 21 further comprising downloading software that performs at least one of the generating, the injecting, and the detecting into a user device.
30. The method of claim 21 further comprising implementing at least one of the generating, the injecting, and the detecting in a server device in a communication network.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP07798540A EP2055018A4 (en) | 2006-06-14 | 2007-06-14 | Code-based echo cancellation |
PCT/US2007/071180 WO2007147033A2 (en) | 2006-06-14 | 2007-06-14 | Code-based echo cancellation |
Applications Claiming Priority (25)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US80480606P | 2006-06-14 | 2006-06-14 | |
US60/804,806 | 2006-06-14 | ||
US11/537,994 | 2006-10-02 | ||
US11/537,994 US20070091907A1 (en) | 2005-10-03 | 2006-10-02 | Secured media communication across enterprise gateway |
US11/537,980 | 2006-10-02 | ||
US11/537,990 US7688820B2 (en) | 2005-10-03 | 2006-10-02 | Classification for media stream packets in a media gateway |
US11/538,042 | 2006-10-02 | ||
US11/538,042 US20070094374A1 (en) | 2005-10-03 | 2006-10-02 | Enterprise-managed wireless communication |
US11/537,980 US20070091848A1 (en) | 2005-10-03 | 2006-10-02 | Reducing data loss during handoffs in wireless communication |
US11/538,037 | 2006-10-02 | ||
US11/538,034 | 2006-10-02 | ||
US11/538,037 US20080119165A1 (en) | 2005-10-03 | 2006-10-02 | Call routing via recipient authentication |
US11/537,990 | 2006-10-02 | ||
US11/537,985 US7546125B2 (en) | 2005-10-03 | 2006-10-02 | Enhancing user experience during handoffs in wireless communication |
US11/538,034 US20070264989A1 (en) | 2005-10-03 | 2006-10-02 | Rendezvous calling systems and methods therefor |
US11/537,985 | 2006-10-02 | ||
US11/755,702 US20080140767A1 (en) | 2006-06-14 | 2007-05-30 | Divitas description protocol and methods therefor |
US11/755,702 | 2007-05-30 | ||
US11/755,710 | 2007-05-30 | ||
US11/755,710 US20080317241A1 (en) | 2006-06-14 | 2007-05-30 | Code-based echo cancellation |
US11/755,704 | 2007-05-30 | ||
US11/755,727 | 2007-05-30 | ||
US11/755,704 US7480500B1 (en) | 2006-06-14 | 2007-05-30 | Divitas protocol proxy and methods therefor |
US11/755,727 US20090016333A1 (en) | 2006-06-14 | 2007-05-30 | Content-based adaptive jitter handling |
PCT/US2007/071180 WO2007147033A2 (en) | 2006-06-14 | 2007-06-14 | Code-based echo cancellation |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2007147033A2 true WO2007147033A2 (en) | 2007-12-21 |
WO2007147033A3 WO2007147033A3 (en) | 2008-07-03 |
Family
ID=42312710
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2007/071180 WO2007147033A2 (en) | 2006-06-14 | 2007-06-14 | Code-based echo cancellation |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP2055018A4 (en) |
WO (1) | WO2007147033A2 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7773743B2 (en) | 2006-04-28 | 2010-08-10 | Microsoft Corporation | Integration of a microphone array with acoustic echo cancellation and residual echo suppression |
US7831035B2 (en) | 2006-04-28 | 2010-11-09 | Microsoft Corporation | Integration of a microphone array with acoustic echo cancellation and center clipping |
US8295475B2 (en) | 2006-01-13 | 2012-10-23 | Microsoft Corporation | Selective glitch detection, clock drift compensation, and anti-clipping in audio echo cancellation |
US8369251B2 (en) | 2008-06-20 | 2013-02-05 | Microsoft Corporation | Timestamp quality assessment for assuring acoustic echo canceller operability |
US8380253B2 (en) | 2008-02-15 | 2013-02-19 | Microsoft Corporation | Voice switching for voice communication on computers |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6010456A (en) | 1998-12-30 | 2000-01-04 | General Electric Company | Method and apparatus for acoustic subtraction imaging using linear and nonlinear ultrasonic images |
US6597787B1 (en) | 1999-07-29 | 2003-07-22 | Telefonaktiebolaget L M Ericsson (Publ) | Echo cancellation device for cancelling echos in a transceiver unit |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6603808B1 (en) * | 1999-07-22 | 2003-08-05 | Compaq Information Technologies Group, L.P. | Dual mode phone line networking modem utilizing conventional telephone wiring |
US6768796B2 (en) * | 2001-02-05 | 2004-07-27 | 3Com Corporation | System and method for echo cancellation |
-
2007
- 2007-06-14 EP EP07798540A patent/EP2055018A4/en not_active Withdrawn
- 2007-06-14 WO PCT/US2007/071180 patent/WO2007147033A2/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6010456A (en) | 1998-12-30 | 2000-01-04 | General Electric Company | Method and apparatus for acoustic subtraction imaging using linear and nonlinear ultrasonic images |
US6597787B1 (en) | 1999-07-29 | 2003-07-22 | Telefonaktiebolaget L M Ericsson (Publ) | Echo cancellation device for cancelling echos in a transceiver unit |
Non-Patent Citations (1)
Title |
---|
See also references of EP2055018A4 |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8295475B2 (en) | 2006-01-13 | 2012-10-23 | Microsoft Corporation | Selective glitch detection, clock drift compensation, and anti-clipping in audio echo cancellation |
US7773743B2 (en) | 2006-04-28 | 2010-08-10 | Microsoft Corporation | Integration of a microphone array with acoustic echo cancellation and residual echo suppression |
US7831035B2 (en) | 2006-04-28 | 2010-11-09 | Microsoft Corporation | Integration of a microphone array with acoustic echo cancellation and center clipping |
US8380253B2 (en) | 2008-02-15 | 2013-02-19 | Microsoft Corporation | Voice switching for voice communication on computers |
US8934945B2 (en) | 2008-02-15 | 2015-01-13 | Microsoft Corporation | Voice switching for voice communication on computers |
US8369251B2 (en) | 2008-06-20 | 2013-02-05 | Microsoft Corporation | Timestamp quality assessment for assuring acoustic echo canceller operability |
Also Published As
Publication number | Publication date |
---|---|
EP2055018A2 (en) | 2009-05-06 |
WO2007147033A3 (en) | 2008-07-03 |
EP2055018A4 (en) | 2009-09-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7480500B1 (en) | Divitas protocol proxy and methods therefor | |
US20080140767A1 (en) | Divitas description protocol and methods therefor | |
US20090016333A1 (en) | Content-based adaptive jitter handling | |
US20080317241A1 (en) | Code-based echo cancellation | |
US20070094374A1 (en) | Enterprise-managed wireless communication | |
US20090147772A1 (en) | Systems and methods for providing presence information in communication | |
US8542668B2 (en) | Wireless VoIP/VIP roaming to access point of different network type | |
US9900356B2 (en) | Method and apparatus for transferring active communication session streams between devices | |
WO2010075126A2 (en) | Systems and methods for enabling communication features utilizing various bearer media | |
JP2015159567A (en) | Method and apparatus for identification and transfer in internet protocol multimedia subsystem collaborative sessions | |
WO2016010595A1 (en) | Managing data streams for a communication network | |
US9525710B2 (en) | Seamless switch over from centralized to decentralized media streaming | |
EP2055018A2 (en) | Code-based echo cancellation | |
JP2007142786A (en) | Handover server, and mobile communication terminal communcable thereof | |
CN117411991A (en) | Video call method based on no-flow network | |
KR20090085018A (en) | Divitas protocol proxy and methods therefor | |
US9035993B2 (en) | Method and system for bypassing an anchor point | |
WO2007147037A2 (en) | Divitas protocol proxy and methods therefor | |
EP2033384A2 (en) | Content-based adaptive jitter handling | |
WO2007147036A2 (en) | Divitas description protocol and methods therefor | |
US10182368B1 (en) | Method and apparatus for bidirectional applications | |
KR20100000976A (en) | Apparatus and method for synchronizing security association state in mobile communication terminal | |
US11962723B2 (en) | Packet telephony terminal apparatus and operating method thereof | |
KR100924162B1 (en) | Control Method of Media Channel at SIP Server and The Communication System with Said Method | |
Khan et al. | Voice over Wireless LAN and analysis of MiniSIP as an 802.11 Phone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07798540 Country of ref document: EP Kind code of ref document: A2 |
|
DPE2 | Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2007798540 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
NENP | Non-entry into the national phase |
Ref country code: RU |