Calculate bandwidth needed for voice traffic, Computer Networking

The second point to consider is that from each location, some calls are internal to that site and some are going to outside locations. Again, as an approximation, MyCo telecom people suggests to use a 50-50 rule (50% internal, 50% going out) for the LOs and 70-30 (70% internal, 30% going out) for the HQ and RC buildings. Given this, calculate bandwidth needed for voice traffic from each location going to other locations. The bandwidth needed for voice calls within each location is not needed because all locations must have broadband connectivity for internal communications.

Posted Date: 3/15/2013 1:55:24 AM | Location : United States







Related Discussions:- Calculate bandwidth needed for voice traffic, Assignment Help, Ask Question on Calculate bandwidth needed for voice traffic, Get Answer, Expert's Help, Calculate bandwidth needed for voice traffic Discussions

Write discussion on Calculate bandwidth needed for voice traffic
Your posts are moderated
Related Questions
Differentiate between Fast fading and Slow fading Fast fading refers to changes in signal strength among a transmitter and receiver as the distance among the two changes by a s

Encryption/decryption using by SSL Once a session is established, the SSL generates a session key using public-key encryption to exchange information between the client and ser


What is a pseudo tty? A pseudo tty or false terminal enables external machines to connect by Telnet or rlogin. Without a pseudo tty, no connection can take place.

java program to implement framing techniques of datalink layer

Q. Define the Distance Vector Routing? Distance Vector Routing Every router periodically shares its knowledge about the entire internet with its neighbours Sharing

What is routing region? When hierarchical routing is used, the routers are separated into what we call regions, with each router knowing all the details about how to route pack


Multicast An identifier for a set of interfaces (typically belonging to dissimilar nodes). A packet sent to a multicast address is delivered to all interfaces identified by tha

Can you define the difference among trusted and untrusted networks?