Analyses of network capacity Sample Clauses

Analyses of network capacity. As to the high power station of wireless telephone system that usually installed on top of high building (above 25 meter), it features large coverage that spans the nearby [***] stations. According to the air interface protocol of PASTM system, mobile phones can at most use the business channels of the two nearby stations, therefore, the usable channel number within its coverage is [***]. According to statistics analysis of UTStarcom Co. on coverage of high power station system, on average [***] of stations can use the nearby two stations, [***] of stations can use the nearby one station and only [***] of stations work individually. A system with [***] stations and [***] channels can provide a calling volume of [***], A system with [***] stations and [***] channels can provide a calling volume of [***] and A system with only [***] station and [***] channels can provide a calling volume of [***]. Zone A: As to a total of [***] power stations of zone A, the supplied calling volume is [***]. As to [***] power stations, in addition to [***] stations, there will another [***] complimentary stations that use group controls of [***] stations. As a result, supplied calling volume is [***]. The total calling volume for Zone A is [***]. According to rules of chapter 3, on average each user has [***], the total supported users is: [***] Zone B: As to a total of [***] power stations of zone B, the supplied calling volume is [***]. As to [***] power stations, in addition to [***] stations, there will another [***] complimentary stations that use group controls of [***] stations. As a result, supplied calling volume is [***]. The total calling volume for Zone A is [***]. According to rules of chapter 3, on average each user uses [***], the total supported users is: [***] Zone C: As to a total of [***] high power stations of zone C, the supplied calling volume is [***]. The total calling volume for Zone B is [***]. According to rules of chapter 3, on average each user uses [***], the total supported users is: [***] Zone A [***] [***] [***] [***] [***] [***] Zone B [***] [***] [***] [***] [***] [***] Zone C [***] [***] [***] [***] [***] [***] Total [***] [***] [***] [***] [***] [***]
AutoNDA by SimpleDocs

Related to Analyses of network capacity

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at a P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.

  • NETWORK INTERCONNECTION METHODS 3.1 The Interconnection provided herein may not be used solely for the purpose of originating a Party’s own interexchange traffic.

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Interconnection 2.1 This section applies to linking with suppliers providing public telecommunications transport networks or services in order to allow the users of one supplier to communicate with users of another supplier and to access services provided by another supplier, where specific commitments are undertaken.

  • Technology Upgrades Notwithstanding any other provision of this Agreement, Verizon shall have the right to deploy, upgrade, migrate and maintain its network at its discretion. The Parties acknowledge that Verizon, at its election, may deploy fiber throughout its network and that such fiber deployment may inhibit or facilitate PNG’s ability to provide service using certain technologies. Nothing in this Agreement shall limit Verizon's ability to modify its network through the incorporation of new equipment or software or otherwise. PNG shall be solely responsible for the cost and activities associated with accommodating such changes in its own network.

  • Power and Capacity The Shareholder has the power, authority and capacity to enter into this Agreement and to consummate the transactions contemplated hereby. This Agreement constitutes the Shareholder’s valid, legal and binding obligation and is enforceable against the Shareholder in accordance with its terms, subject, however, as to enforcement, to bankruptcy, insolvency, fraudulent transfer, moratorium and similar laws of general applicability relating to or affecting creditors’ rights;

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!