SlideShare a Scribd company logo
TRUNKING THEORY
BY: PIRH KHAN (14ES38)
CONTENTS
•Problem statement
•Purpose of trunking theory
•Introduction
•Common terms in trunking theory
•Types of trunked systems
•Traffic intensity
•Example problem
Problem statement
Limited number of channels
Many users
For example a telephone system has 4 users and 3 channels.
Central
office
user useruseruser
Purpose of trunking theory
To determine the required capacity and allocate the proper
number of channels in order to meet GOS.
GOS: grade of service is the measure of user’s ability to
access a trunked system during busiest hour.
Introduction
Trunking theory was represented by Erlang in the late 19th
century.
It helps in establishing a trunked system which provides
communication services to a large group of users with limited
number of available channels in the system.
All PSTN/cellular radio systems exploits trunking theory to
cover a large user community with limited number of
circuits/frequency spectrum.
In a trunked radio system, each user is allocated a channel on
a per call basis, and upon the termination of the call, the
previously occupied channel is immediately returned to the
pool of channels.
In telephone system, it is used to determine the number of
telephone circuits that need to be allocated for office buildings
with hundreds of telephones.
Common terms in trunking theory
Set-up time: Time required to allocate a channel to the
requesting user.
Blocked call: call which can not be completed at the time of
request, also called as lost call.
Holding time: average duration of a typical call, denoted by
“H”.
Load: traffic intensity across the entire trunked system.
Request rate: the average number of requesting call requests
per unit time. It is denoted by “λ”
Types of trunked system
There are two types of trunked systems commonly used.
1. Blocked calls cleared: It offers no queuing for call request.
That is, for every requesting user, it is assumed to have no
any set-up time and user is given immediate access to
channel if available. If no channel is available, the
requesting user is blocked and is free to try again later.
2. Blocked calls delayed: it offers a queue to hold the calls
which are blocked. If channel is not available for the
requesting user, the call request may be delayed until a
channel becomes available.
Traffic intensity
Traffic intensity is measured in erlangs, 1 erlang is the amount
of traffic intensity carried by a channel that is completely
occupied i.e. one call-minute per minute. It is denoted by “A”
Each user generates a traffic intensity of Au erlangs.
 Au= λH
Where λ is the average number of call requests per unit time,
H is the average duration of call
Example
There are 3000 calls per hour, each lasting an average of 1.76 min.
what is the traffic intensity?
Solution: Data
average duration of a call (H) = 1.76 min
call request per unit time (λ) = 3000/hour = 3000/60= 50
Since, traffic intensity (A) = H×λ
Therefore, A = 1.76×50= 88 Erlangs.
THANK YOU!

More Related Content

What's hot

Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
Diversity techniques presentation material
Diversity techniques presentation materialDiversity techniques presentation material
Diversity techniques presentation material
Nini Lashari
 
Public Switched Telephone Network
Public Switched Telephone NetworkPublic Switched Telephone Network
Public Switched Telephone Network
Haither Mithath
 
Windowing ofdm
Windowing ofdmWindowing ofdm
Windowing ofdm
Sreeram Reddy
 
Introduction To Wireless Fading Channels
Introduction To Wireless Fading ChannelsIntroduction To Wireless Fading Channels
Introduction To Wireless Fading Channels
Nitin Jain
 
Lecture5 teletraffic
Lecture5 teletrafficLecture5 teletraffic
Lecture5 teletraffic
mazlina1202
 
Ec 2401 wireless communication unit 4
Ec 2401 wireless communication   unit 4Ec 2401 wireless communication   unit 4
Ec 2401 wireless communication unit 4
JAIGANESH SEKAR
 
Chap 4 (large scale propagation)
Chap 4 (large scale propagation)Chap 4 (large scale propagation)
Chap 4 (large scale propagation)
asadkhan1327
 
The Wireless Channel Propagation
The Wireless Channel PropagationThe Wireless Channel Propagation
The Wireless Channel Propagation
Pei-Che Chang
 
Multiplexing : FDM
Multiplexing : FDMMultiplexing : FDM
Multiplexing : FDM
Dr Rajiv Srivastava
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communication
asadkhan1327
 
Channel planning
Channel planningChannel planning
Channel planning
AJAL A J
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocol
Priya Kaushal
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
METHODIST COLLEGE OF ENGG & TECH
 
2.5 capacity calculations of fdma, tdma and cdma
2.5   capacity calculations of fdma, tdma and cdma2.5   capacity calculations of fdma, tdma and cdma
2.5 capacity calculations of fdma, tdma and cdma
JAIGANESH SEKAR
 
Small Scale Multi path measurements
Small Scale Multi path measurements Small Scale Multi path measurements
Small Scale Multi path measurements
Siva Ganesan
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
anushkashastri
 
2.3 time division multiple access
2.3   time division multiple access2.3   time division multiple access
2.3 time division multiple access
JAIGANESH SEKAR
 
Transceiver design
Transceiver designTransceiver design
Transceiver design
Chetan Soni
 
rake reciever ppt
rake reciever pptrake reciever ppt
rake reciever ppt
Divya Shukla
 

What's hot (20)

Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Diversity techniques presentation material
Diversity techniques presentation materialDiversity techniques presentation material
Diversity techniques presentation material
 
Public Switched Telephone Network
Public Switched Telephone NetworkPublic Switched Telephone Network
Public Switched Telephone Network
 
Windowing ofdm
Windowing ofdmWindowing ofdm
Windowing ofdm
 
Introduction To Wireless Fading Channels
Introduction To Wireless Fading ChannelsIntroduction To Wireless Fading Channels
Introduction To Wireless Fading Channels
 
Lecture5 teletraffic
Lecture5 teletrafficLecture5 teletraffic
Lecture5 teletraffic
 
Ec 2401 wireless communication unit 4
Ec 2401 wireless communication   unit 4Ec 2401 wireless communication   unit 4
Ec 2401 wireless communication unit 4
 
Chap 4 (large scale propagation)
Chap 4 (large scale propagation)Chap 4 (large scale propagation)
Chap 4 (large scale propagation)
 
The Wireless Channel Propagation
The Wireless Channel PropagationThe Wireless Channel Propagation
The Wireless Channel Propagation
 
Multiplexing : FDM
Multiplexing : FDMMultiplexing : FDM
Multiplexing : FDM
 
cellular concepts in wireless communication
cellular concepts in wireless communicationcellular concepts in wireless communication
cellular concepts in wireless communication
 
Channel planning
Channel planningChannel planning
Channel planning
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocol
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
2.5 capacity calculations of fdma, tdma and cdma
2.5   capacity calculations of fdma, tdma and cdma2.5   capacity calculations of fdma, tdma and cdma
2.5 capacity calculations of fdma, tdma and cdma
 
Small Scale Multi path measurements
Small Scale Multi path measurements Small Scale Multi path measurements
Small Scale Multi path measurements
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
 
2.3 time division multiple access
2.3   time division multiple access2.3   time division multiple access
2.3 time division multiple access
 
Transceiver design
Transceiver designTransceiver design
Transceiver design
 
rake reciever ppt
rake reciever pptrake reciever ppt
rake reciever ppt
 

Similar to Trunking Theory

Wireless communications principles_and_p
Wireless communications principles_and_pWireless communications principles_and_p
Wireless communications principles_and_p
Sara El Filali
 
Telephone Traffic Engineering Online Lec
Telephone Traffic Engineering Online LecTelephone Traffic Engineering Online Lec
Telephone Traffic Engineering Online Lec
fllcampolet
 
Wireless traffic theory and handoff
Wireless traffic theory and handoffWireless traffic theory and handoff
Wireless traffic theory and handoff
Munaf Rashid
 
Teletraffic engineeringTeletraffic engineers use their knowledge (2).pptx
Teletraffic engineeringTeletraffic engineers use their knowledge  (2).pptxTeletraffic engineeringTeletraffic engineers use their knowledge  (2).pptx
Teletraffic engineeringTeletraffic engineers use their knowledge (2).pptx
MdSharifUddinShajib
 
Traffic analysis
Traffic analysisTraffic analysis
Traffic analysis
Srashti Vyas
 
M & WC unit 1.pptx very good condition and success
M & WC unit 1.pptx very good condition and successM & WC unit 1.pptx very good condition and success
M & WC unit 1.pptx very good condition and success
20EC040
 
Lecture 3 trunking theory and other issues with cells
Lecture 3 trunking theory and other issues with cellsLecture 3 trunking theory and other issues with cells
Lecture 3 trunking theory and other issues with cells
UmairKhalil16
 
ECS455 - 2 - 4 - Erlang B Formula.pdf
ECS455 - 2 - 4 - Erlang B Formula.pdfECS455 - 2 - 4 - Erlang B Formula.pdf
ECS455 - 2 - 4 - Erlang B Formula.pdf
SujanShrestha386167
 
asabydqwfdytwdv.ppt
asabydqwfdytwdv.pptasabydqwfdytwdv.ppt
asabydqwfdytwdv.ppt
WrushabhShirsat3
 
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORKOPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
Praktan Patil
 
Important question bank
Important question bankImportant question bank
Important question bank
Dr. Raju Ranjan
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
SHALINI a
 
Freq reuse detail.ppt
Freq reuse  detail.pptFreq reuse  detail.ppt
Freq reuse detail.ppt
javeriazafeer
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum Spreading
Meenakshi Paul
 
Analog and digital communications. Electronic Course.pptx
Analog and digital communications.  Electronic Course.pptxAnalog and digital communications.  Electronic Course.pptx
Analog and digital communications. Electronic Course.pptx
keemjupiter
 
WIRELESS COMMUNICATION Unit-2 Final.pptx
WIRELESS  COMMUNICATION Unit-2 Final.pptxWIRELESS  COMMUNICATION Unit-2 Final.pptx
WIRELESS COMMUNICATION Unit-2 Final.pptx
MadeshR3
 
1. Multiplexing Concept.pptx
1. Multiplexing Concept.pptx1. Multiplexing Concept.pptx
1. Multiplexing Concept.pptx
shivnarayansingh12
 
Computer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabusComputer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabus
NANDINI SHARMA
 
Fundamental of cellular system
Fundamental of cellular systemFundamental of cellular system
Fundamental of cellular system
M.E. at GTU- PG School
 
Frequency Hopping Spread Spectrum (FHSS) System
Frequency Hopping Spread Spectrum (FHSS) System Frequency Hopping Spread Spectrum (FHSS) System
Frequency Hopping Spread Spectrum (FHSS) System
Ahmed Alfadhel
 

Similar to Trunking Theory (20)

Wireless communications principles_and_p
Wireless communications principles_and_pWireless communications principles_and_p
Wireless communications principles_and_p
 
Telephone Traffic Engineering Online Lec
Telephone Traffic Engineering Online LecTelephone Traffic Engineering Online Lec
Telephone Traffic Engineering Online Lec
 
Wireless traffic theory and handoff
Wireless traffic theory and handoffWireless traffic theory and handoff
Wireless traffic theory and handoff
 
Teletraffic engineeringTeletraffic engineers use their knowledge (2).pptx
Teletraffic engineeringTeletraffic engineers use their knowledge  (2).pptxTeletraffic engineeringTeletraffic engineers use their knowledge  (2).pptx
Teletraffic engineeringTeletraffic engineers use their knowledge (2).pptx
 
Traffic analysis
Traffic analysisTraffic analysis
Traffic analysis
 
M & WC unit 1.pptx very good condition and success
M & WC unit 1.pptx very good condition and successM & WC unit 1.pptx very good condition and success
M & WC unit 1.pptx very good condition and success
 
Lecture 3 trunking theory and other issues with cells
Lecture 3 trunking theory and other issues with cellsLecture 3 trunking theory and other issues with cells
Lecture 3 trunking theory and other issues with cells
 
ECS455 - 2 - 4 - Erlang B Formula.pdf
ECS455 - 2 - 4 - Erlang B Formula.pdfECS455 - 2 - 4 - Erlang B Formula.pdf
ECS455 - 2 - 4 - Erlang B Formula.pdf
 
asabydqwfdytwdv.ppt
asabydqwfdytwdv.pptasabydqwfdytwdv.ppt
asabydqwfdytwdv.ppt
 
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORKOPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
OPPORTUNISTIC MULTIPLE ACCESS TECHNIQUES FOR COGNITIVE RADIO NETWORK
 
Important question bank
Important question bankImportant question bank
Important question bank
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Freq reuse detail.ppt
Freq reuse  detail.pptFreq reuse  detail.ppt
Freq reuse detail.ppt
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum Spreading
 
Analog and digital communications. Electronic Course.pptx
Analog and digital communications.  Electronic Course.pptxAnalog and digital communications.  Electronic Course.pptx
Analog and digital communications. Electronic Course.pptx
 
WIRELESS COMMUNICATION Unit-2 Final.pptx
WIRELESS  COMMUNICATION Unit-2 Final.pptxWIRELESS  COMMUNICATION Unit-2 Final.pptx
WIRELESS COMMUNICATION Unit-2 Final.pptx
 
1. Multiplexing Concept.pptx
1. Multiplexing Concept.pptx1. Multiplexing Concept.pptx
1. Multiplexing Concept.pptx
 
Computer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabusComputer Network MAC Layer Notes as per RGPV syllabus
Computer Network MAC Layer Notes as per RGPV syllabus
 
Fundamental of cellular system
Fundamental of cellular systemFundamental of cellular system
Fundamental of cellular system
 
Frequency Hopping Spread Spectrum (FHSS) System
Frequency Hopping Spread Spectrum (FHSS) System Frequency Hopping Spread Spectrum (FHSS) System
Frequency Hopping Spread Spectrum (FHSS) System
 

Recently uploaded

Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
Addu25809
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
Madan Karki
 

Recently uploaded (20)

Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
 

Trunking Theory

  • 1. TRUNKING THEORY BY: PIRH KHAN (14ES38)
  • 2. CONTENTS •Problem statement •Purpose of trunking theory •Introduction •Common terms in trunking theory •Types of trunked systems •Traffic intensity •Example problem
  • 3. Problem statement Limited number of channels Many users For example a telephone system has 4 users and 3 channels. Central office user useruseruser
  • 4. Purpose of trunking theory To determine the required capacity and allocate the proper number of channels in order to meet GOS. GOS: grade of service is the measure of user’s ability to access a trunked system during busiest hour.
  • 5. Introduction Trunking theory was represented by Erlang in the late 19th century. It helps in establishing a trunked system which provides communication services to a large group of users with limited number of available channels in the system. All PSTN/cellular radio systems exploits trunking theory to cover a large user community with limited number of circuits/frequency spectrum.
  • 6. In a trunked radio system, each user is allocated a channel on a per call basis, and upon the termination of the call, the previously occupied channel is immediately returned to the pool of channels. In telephone system, it is used to determine the number of telephone circuits that need to be allocated for office buildings with hundreds of telephones.
  • 7. Common terms in trunking theory Set-up time: Time required to allocate a channel to the requesting user. Blocked call: call which can not be completed at the time of request, also called as lost call. Holding time: average duration of a typical call, denoted by “H”. Load: traffic intensity across the entire trunked system. Request rate: the average number of requesting call requests per unit time. It is denoted by “λ”
  • 8. Types of trunked system There are two types of trunked systems commonly used. 1. Blocked calls cleared: It offers no queuing for call request. That is, for every requesting user, it is assumed to have no any set-up time and user is given immediate access to channel if available. If no channel is available, the requesting user is blocked and is free to try again later. 2. Blocked calls delayed: it offers a queue to hold the calls which are blocked. If channel is not available for the requesting user, the call request may be delayed until a channel becomes available.
  • 9. Traffic intensity Traffic intensity is measured in erlangs, 1 erlang is the amount of traffic intensity carried by a channel that is completely occupied i.e. one call-minute per minute. It is denoted by “A” Each user generates a traffic intensity of Au erlangs.  Au= λH Where λ is the average number of call requests per unit time, H is the average duration of call
  • 10. Example There are 3000 calls per hour, each lasting an average of 1.76 min. what is the traffic intensity? Solution: Data average duration of a call (H) = 1.76 min call request per unit time (λ) = 3000/hour = 3000/60= 50 Since, traffic intensity (A) = H×λ Therefore, A = 1.76×50= 88 Erlangs.