Calculate number of ccs that is equivalent to two erlangs

Assignment Help Computer Networking
Reference no: EM131026724

Question 1. What is the name of the gateway interface/port that faces an analog phone?

Foreign Exchange Office (FXO)

Foreign Exchange Subscriber (FXS)

Direct Inward Dialing (DID)

Dual-tone Multi-frequency (DTMF)

Question 2. Which of the following is a best practice, from the trunk service perspective, for improving the availability of an enterprise voice system?

Redundant local loops.

Separate entry points for trunks (or access lines) to enter a building.

Access trunks from two carriers.

All of the above

Question 3. The _____ information is sent into the trunk when placing an E911 call.

Calling Line ID (CLID)

Time Division Multiplexing (TDM)

Dual-tone Multi-frequency (DTMF)

Network Address Translation (NAT)

Question 4. Hundred seconds of total holding time during the Busy Hour generates a traffic load of _____.

1 Erlang

1 CCS

36 Erlang

60 CCS

Question 5. Calculate the number of CCS that is equivalent to 2 Erlangs.

2

72

120

200

Question 6. Given that the traffic load remains the same, which of the following call blocking probabilities will demand more trunk resources (e. g., trunk circuits)?

1%

2%

3%

4%

Question 7. A device that translates signaling formats between SIP and H.323, SIGTRAN, ISDN, channel associated signaling (CAS), or SS7.

Media Gateway

Softswitch

Session Initiation Protocol (SIP) Proxy

Session Border Controller (SBC)

Question 8. Give the following data during the busy hour: 200 out of 210 call attempts were completed, calculate the call blocking probability.

5.0%

4.8 %

95.2%

9.52%

Question 9. Calculate the number of Erlangs that is equivalent to 100 CCS.

3.5

2.8

5.6

9.2

Question 10. Calculate the utilization of a T1 trunk that on average carries 0.926 Mbps of traffic.

16.7%

62%

1.67%

0.6%

Reference no: EM131026724

Questions Cloud

What is polymorphism concept means and give an example : what this concept means and give an example to illustrate your understanding of the topic. You must use Java classes and Java interfaces to help with your description.
Does either one of these formulas define a norm : Does either one of these formulas define a norm? If yes, show that all three axioms of norm hold. If no, demonstrate which axiom fails.
Write an essay comparing the roles of web services : Write an essay comparing and contrasting the roles of web services, and analyze the benefits of treating a web service as a black box.
Write the chemical symbols including mass and atomic numbers : All the stable isotopes of boron, carbon, nitrogen, oxygen, and fluorine are shown in the chart in the right hand column (in red), along with their radioactive isotopes with t1>2 7 1 min (in blue). Write the chemical symbols, including mass and a..
Calculate number of ccs that is equivalent to two erlangs : Calculate the number of CCS that is equivalent to 2 Erlangs. What is the name of the gateway interface/port that faces an analog phone?
Zara - identify logistics management strategies : How can Zara maintain its competitive advantage, here the concept of sustainability may be introduced - Are there similarities between Zara Dells and Myers formula for success and could this be suitable for other companies and if so explain why, if ..
Examples of accounting topics : Using information from this chapter and earlier give examples of accounting topics on which there are major differences between two national accounting systems or between a national system and IFRS.
Degree of independence of the standard-setter : Is there a connection between the amount of political lobbying in a country and the degree of independence of the standard-setter from (a) government departments, and (b) the accountancy profession?
What factors are measured : Review the literature pertaining to the SECM and CMMI tools and their application. What are the basic objectives of each (how do they differ)? What factors are measured? Briefly describe the steps to be followed in the implementation of each.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explaining bgpv4 router receives update

Suppose a BGPv4 router receives update for prefix P which indicates AS1 is next hop.

  Define current and emerging networking technology

ITC233 - Network Engineering, This subject is designed to provide students with experience in current and emerging networking technology. The subject provides students with the skills and practice needed to design, build and maintain small to mediu..

  List five companies that provide p2p file-sharing services

List five companies that provide P2P file-sharing services. Identify what types of files P2P file-sharing services can deliver, and if there are different approaches for different file types.

  What activity is a burst activity

Draw a project network from the following information. What activity(s) is a burst activity? What activity(s) is a merge activity

  Determine maximum size of set l-tcp sequence number

Determine the maximum size of set L such that TCP sequence number doesn't run out? Remember TCP sequence number field size is 4 bytes.

  What kind of higher-level protocol is this datagram

an ipv4 header bytes in hex notation is given below 45 00 05 dc fd 2b 20 00 80 11 95 ca c0 a8 00 64 c0 a8 00 66.

  Security issues

Provide an example explaining the best use of Virus, Encryption, VPN, Firewall securities, when and why?Which security areas you are using and applying to your securities? Also explain why?

  2-d environment

Write a class called point for the 2-D environment. Select appropriate variable(s). Write constructors. Write access methods for the variables.

  Compute the throughput for file transfer

Host A wishes to send the large file to Host B. Path from Host A to Host B has three links, of rates R1=10 Mbps, R2=500 kbps, and R3=750 Kbps. (1Kbit=210bit) Suppose no other traffic in network, determine the throughput for file transfer?

  Andrea stevens cosmetics is a small cosmetics

Andrea Stevens Cosmetics is a small cosmetics company that has a network of 30 computers. They are currently using a 10BaseT network that is wired with Category 5 Plenum cable

  Ways to secure a wlan

Explain in 200 to 300 words at least two different ways to secure a WLAN. What are the ramifications if a WLAN is breached

  Identify any rework loops and delays in the process

Identify any rework loops and delays in the process. What causes these. What is the impact on cycle times. How might this affect customers' willingness to do business with Faircloth

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd