Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
A call processor in an exchange requires 120 ms to service a complete call. What is the BHCA rating for the processor? If the exchange is capable of carrying 700 Erlangs of traffic, what is the call completion rate? Assume an average call holding time of 2 minutes.
Call service time= 120ms
BHCA-(60X60)/ (120X10-3)=30,000
th =holding time 2 minutes
Ao=mean effective traffic carried through the network=700 Erlangs
Ao==Co X th ,
Here
Co=mean effective traffic rate
Therefore Co = Ao/ th =700/2 per minute= 21,000 calls per hour
Therefore total call attempts in Busy Hour= 30,000
And number of successful calls= 21,000
So, CCR= 21,000/30.000 = 0.7
E-brokerage. An e-brokerage is an investment house that permits you to buy and sell stocks and get investment information from its Web site.
Primary objectives/details of Load Sharing Facility Resource Management Software (LSFRMS) are better resource utilisation by routing task to most suitable system as well a better u
Define the term Intranet. Intranet: An Intranet is a type of information system that facilitates communication within the organizations among widely dispersed department
What are the differences between struts and units? A warm up question. Units are static objects that exist from the start of the simulation right up to its end, whereas struts
Q: Challenges and Prospects in Changing Information Technology? There is no doubt that information technology has made significant progress during the past two decades. Modern
Explain the System Design of Object oriented modelling System Design : At this stage, the whole system model is designed. This is the phase where the complete system is divi
mine sweeper algorithm.
CIH, also known as Chernobyl or Spacefiller, is a Microsoft Windows computer virus which first emerged in 1998. It is one of the most damaging viruses, overwriting critical inform
Vector-Memory Instructions : When vector operations with memory M are executed then these are vector-memory instructions. These instructions are denoted with the many function mapp
State the SELECTIVE CLEAR - logic micro operations The selective-clear operation clears to 0 bits in register A only where there are corresponding 1's in the register B. For
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd