Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Discuss grade of service. During busy hour, 1500 calls were offered to a group of trunks and 8 calls were lost. The average call duration was 120 seconds. Calculate the traffic offered, traffic lost, Grade of service and total duration of congestion.
(i) Grade of service: In loss systems, the traffic carried through the network is usually lower than the actual traffic offered to the network through the subscribers. The overload traffic is discarded and therefore it is not carried by the network. The amount of traffic discarded by the network is an index of the quality of the service offered through the network. It is termed Grade of Service (GOS) and is explained as the ratio of lost traffic to offered traffic. Offered traffic is the product of the average number of calls generated through the users and the average holding time per call. Therefore, GOS is given as
GOS = (A-A0)/A
Here
A= offered traffic A0 = carried traffic A-A0= lost traffic (ii) we know that
Traffic offered = A = Ch/T = (1500 x 2)/360 = 50 E
Traffic lost = (8 x 2)/(6/30) = (4 E)/15 = 0.26 E
Grade of service = Number of call lost/Number of calls offered
= 8/1500
Duration of congestion = Grade of service x 1 h
= (8 x 3600)/1500 = (96)/5 = 19.2 sec.
Give some technical specification for subscriber lines. Subscriber pairs and exchange pairs are interconnected at the MDF through jumpers. The MDF therefore gives a flexible in
Instruction Issue degree : The major concept in superscalar processing is how many instructions we can issue per cycle. If we issue k number of instructions per cycle in a supersca
This is the set of tools and facilities that you work with as the MATLAB user or programmer. It contains facilities for managing the variables in your workspace and importing and e
Give some examples of malicious data. In May 2002 year, the Norton Anti-Virus software for Windows operating systems detected around 61000 malicious programs. Several of them a
What is Digitizers A common device for drawing, painting, or interactively selecting coordinate positions on an object is a digitizer. These devices can be used to input coordi
Discuss the different techniques with which a file can be shared among different users. Several popular techniques with that a file can be shared among various users are: 1
Determine the approaches to organizing stored program control There are 2 approaches to organizing stored program control: 1. Centralized: In this control, all control equi
WLS8 handles JMX but it uses weblogic execution of JMX server. It does not supports generalise sun javax API which can be used with any JVM. There are some patches available which
Differentiate between adaptive and non-adaptive routing. Adaptive routing defines the ability of a system, by which routes are characterised through their destination, to cha
A firewall is Software or hardware used to separate a private network from a public network.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd