Linksys WIP310 SPA500 Series and WIP310 IP Phone Administration Guide - Page 127

Factors Affecting Voice Quality, Configuring Security, Quality, and Network Features, Codec, Bandwidth

Page 127 highlights

Configuring Security, Quality, and Network Features Ensuring Voice Quality 5 The following table approximates the bandwidth budget for each side of the conversation (in each direction) using different codecs and number of calls. This table is based on the following assumptions: • Bandwidth calculated with no silence suppression • 20 millisecond of payload per RTP packet Codec G.711 G.722 G.726-40 G.726-32 G.726-24 G.726-16 G.729 Est. Bandwidth Budget 110 kbps 110 kbps 87 kbps 79 kbps 71 kbps 63 kbps 55 kbps 2 Calls 220 kbps 220 kbps 174 kbps 158 kbps 142 kbps 126 kbps 110 kbps 4 Calls 440 kbps 440 kbps 348 kbps 316 kbps 284 kbps 252 kbps 220 kbps 6 Calls 660 kbps 660 kbps 522 kbps 474 kbps 426 kbps 378 kbps 330 kbps 8 Calls 880 kbps 880 kbps 696 kbps 632 kbps 568 kbps 504 kbps 440 kbps NOTE The use of silence suppression can reduce the average bandwidth budget by 30% or more. For more information about bandwidth calculation, refer to the following websites: http://www.erlang.com/calculator/lipb/ http://www.packetizer.com/voip/diagnostics/bandcalc.html Factors Affecting Voice Quality The following factors contribute to voice quality: • Audio compression algorithm-Speech signals are sampled, quantized, and compressed before they are packetized and transmitted to the other end. For IP Telephony, speech signals are usually sampled at 8000 samples per second with 12-16 bits per sample. The compression algorithm plays a large role in determining the voice quality of the reconstructed speech Cisco SPA 500 Series and WIP310 IP Phone Administration Guide 116

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300

Configuring Security, Quality, and Network Features
Ensuring Voice Quality
Cisco SPA 500 Series and WIP310 IP Phone Administration Guide
116
5
The following table approximates the bandwidth budget for each side of the
conversation (in each direction) using different codecs and number of calls. This
table is based on the following assumptions:
Bandwidth calculated with no silence suppression
20 millisecond of payload per RTP packet
NOTE
The use of silence suppression can reduce the average bandwidth budget by 30%
or more.
For more information about bandwidth calculation, refer to the following websites:
Factors Affecting Voice Quality
The following factors contribute to voice quality:
Audio compression algorithm—Speech signals are sampled, quantized,
and compressed before they are packetized and transmitted to the other
end. For IP Telephony, speech signals are usually sampled at 8000 samples
per second with 12–16 bits per sample. The compression algorithm plays a
large role in determining the voice quality of the reconstructed speech
Codec
Est.
Bandwidth
Budget
2 Calls
4 Calls
6 Calls
8 Calls
G.711
110 kbps
220 kbps
440 kbps
660 kbps
880 kbps
G.722
110 kbps
220 kbps
440 kbps
660 kbps
880 kbps
G.726-40
87 kbps
174 kbps
348 kbps
522 kbps
696 kbps
G.726-32
79 kbps
158 kbps
316 kbps
474 kbps
632 kbps
G.726-24
71 kbps
142 kbps
284 kbps
426 kbps
568 kbps
G.726-16
63 kbps
126 kbps
252 kbps
378 kbps
504 kbps
G.729
55 kbps
110 kbps
220 kbps
330 kbps
440 kbps