Echo control in telecommunications

Shoji Makino, Shoji Shimada

Research output: Contribution to journalArticlepeer-review

5 Citations (Scopus)

Abstract

This paper reviews echo control techniques for telecommunications, emphasizing the principles and applications of both circuit and acoustic echo cancellers. First, echo generating mechanisms and echo problems are described for circuit and acoustic echoes. Circuit echo is caused by impedance mismatching in a hybrid coil. Acoustic echo is caused by acoustic coupling between loudspeakers and microphones in a room. The echo problem is severe when the round-trip propagation delay is long. In this case, the echo must be removed. Next, the basic principle of the echo canceller, adaptive filter structure and adaptive algorithm are discussed. Emphasis is focused on the construction and operation of an adaptive transversal filter using the NLMS (Normalized Least Mean Square) algorithm, which is the most popular for the echo canceller. Then, applications of circuit and acoustic echo cancellers are described. Circuit echo cancellers have been well studied and implemented in LSIs for many applications. Although acoustic echo cancellers have been introduced into audio teleconference systems, they still have some problems which must be solved. Therefore, they are now being studied intensely. Finally, this paper mentions the problems of echo cancellers and the direction of future work on them. The main targets for acoustic echo cancellers are improving the convergence speed, reducing the amount of hardware and bettering the double-talk control technique.

Original languageEnglish
Pages (from-to)309-316
Number of pages8
JournalJournal of the Acoustical Society of Japan (E)
Volume11
Issue number6
DOIs
Publication statusPublished - 1990
Externally publishedYes

Keywords

  • Adaptive filter
  • Digital signal processing
  • Echo
  • Echo canceller
  • Telecommunication

ASJC Scopus subject areas

  • Acoustics and Ultrasonics

Fingerprint Dive into the research topics of 'Echo control in telecommunications'. Together they form a unique fingerprint.

Cite this