Premium Essay

Quality Wireless a and B

In:

Submitted By Natasha11
Words 1028
Pages 5
1. What fraction of the days in 2004-2004 failed to meet the targeted daily average hold time of 110 econds? Given that the daily average hold time was normally distributed with a mean of 99.67 and a standard deviation of 24.24, what fraction of days where the call center failed to meet the targeted hold time of 110 seconds would you expect?

a) Based on the data in the exhibit 1, the number of days out of target hold time (more than 110 seconds) is 237. And total number of days is 728. Therefore, fraction of days is equal to 237/728 or 0.32. Total number of days | 728 | Number of days within target hold time (110 seconds or less) | 491 | Number of days out of target hold time (more than 110 seconds) | 237 | Fraction of days where the call center failed to meet targeted hold time | 0.3255 | Fraction of days where the call center failed to meet targeted hold time (%) | 33% |

b) Based on the X=X+z*σ equation, we find the value of z.
X=99.67
σ=24.24
Target hold time = 110 seconds

Then, 110 = 99.67 + z * 24.24. From the equation, z is equal to 0.42. Thus fraction of days where the call center failed to meet targeted hold time is equal to 1 - 0.6628 or 0.33. 2. What fraction of the days in April 2005 failed to meet the targeted daily average hold time of 110 seconds? Given that the daily average hold time after process improvements was normally distributed with a mean of 79.50 and a standard deviation of 16.86, what fraction of days where the call center failed to meet the targeted hold time of 110 seconds would you expect?

a) Based on the data in the exhibit 3, the number of days out of target hold time (more than 110 seconds) is 1. And total number of days is 30. Therefore fraction of days is equal to 1/30 or 0.033. Total number of days | 30 | Number of days within target hold time (110 seconds or less) | 29 | Number of days

Similar Documents

Premium Essay

Se 571 Principles of Information Security and Privacy Midterm Exam

...list two controls that can be implemented to help achieve that goal. 2. (TCO A) List and define five desirable qualities in a process designed to evaluate the trustworthiness of an operating system 3. (TCO B) Suppose you have a high capacity network connection coming into your home, and you also have a wireless network access point. Also suppose you do not use the full capacity of your network connection. List three reasons you might still want to prevent an outsider obtaining free network access by intruding into your wireless network 4. (TCO C) Explain how a hashing algorithm works and how it can be used to provide authentication and data integrity 5. (TCO B) Which of the following is a correct statement? SE 571 Principles of Information Security and privacy Midterm Exam Follow Link Below To Get Tutorial https://homeworklance.com/downloads/se-571-principles-of-information-security-and-privacy-midterm-exam/ SE 571 Principles of Information Security and privacy Midterm Exam 1. (TCO A) What are the three goals of security in computing? For each goal, list two controls that can be implemented to help achieve that goal. 2. (TCO A) List and define five desirable qualities in a process designed to evaluate the trustworthiness of an operating system 3. (TCO B) Suppose you have a high capacity network connection coming into your home, and you also have a wireless network access point. Also suppose you do not use the full capacity of your network connection. List three reasons...

Words: 3561 - Pages: 15

Free Essay

Verizon

...131 Assignment Title: Verizon wireless & competitive advantage MBA (G1) 4th semester Department of Management Sciences The Islamia University Bahawalpur Table of Contents History……………………………………………………………………….4 Introduction…………………………………………………………………4 Marketing overview: Verizon wireless competition influence…………..5 Management information system…………………………………………..7 Porter’s Five Forces Analysis………………………………………………8 Verizon Wireless Value Chain…………………………………………….11 Verizon wireless Strategies for Competitive Advantage………………..12 Competitive advantage of Verizon wireless……………………………...14 Conclusion………………………………………………………………….14 Company History: Verizon communication Inc. Verizon was formed on June 30, 2000 with $52 billion dollar merger is done b/w Bell Atlantic Corp & GTE Corp. That are world’s largest telecommunication companies Mergers & acquisitions were necessitating for prolonged growth, government participation and high infrastructure cost help the development of telecommunication industry. In the merger the Bell Atlantic and GTE London based Vodafone group declare for the creation of new wireless business which is called Verizon wireless (vw). The majority owner of Verizon is vw (55%)...

Words: 3183 - Pages: 13

Premium Essay

Technology

...4g Wireless Network 4G Wireless Networks: Opportunities and Challenges Hassan Gobjuka Verizon 919 hidden Ridge Irving, TX 75038 Abstract With the major wireless service providers planning to start deployment of 4G wireless networks by mid 2010, research and industry communities are racing against time to find solutions for some of the prominent still open issues in 4G networks. The growing interest in 4G networks is driven by the set of new services will be made available for the first time such as accessing the Internet anytime from anywhere, global roaming, and wider support for multimedia applications. In this paper describe some of the key opportunities will be made available by 4G networks, present key challenges and point to some proposed solutions. Index Terms—4G networks, Wireless Networks, Security and Privacy, Quality of Service, Architecture I.INTRODUCTION The existence of 4G Networks in today’s technology-driven society is important indicators of advancement and change. 4G, or Fourth Generation networks, are designed to facilitate improved wireless capabilities, network speeds, and visual technologies. It is anticipated that as these networks continue to thrive, the demand for advanced related technologies will also grow, thereby creating new alternatives for savvy technology users to exceed their desired expectations. The following discussion will evaluate the current state of 3G Networks and will examine the future potential of these networks in expanding...

Words: 2805 - Pages: 12

Premium Essay

4g Wireless Network

...4G Wireless Networks: Opportunities and Challenges Hassan Gobjuka Verizon 919 hidden Ridge Irving, TX 75038 Abstract With the major wireless service providers planning to start deployment of 4G wireless networks by mid 2010, research and industry communities are racing against time to find solutions for some of the prominent still open issues in 4G networks. The growing interest in 4G networks is driven by the set of new services will be made available for the first time such as accessing the Internet anytime from anywhere, global roaming, and wider support for multimedia applications. In this paper describe some of the key opportunities will be made available by 4G networks, present key challenges and point to some proposed solutions. Index Terms—4G networks, Wireless Networks, Security and Privacy, Quality of Service, Architecture I.INTRODUCTION The existence of 4G Networks in today’s technology-driven society is important indicators of advancement and change. 4G, or Fourth Generation networks, are designed to facilitate improved wireless capabilities, network speeds, and visual technologies. It is anticipated that as these networks continue to thrive, the demand for advanced related technologies will also grow, thereby creating new alternatives for savvy technology users to exceed their desired expectations. The following discussion will evaluate the current state of 3G Networks and will examine the future potential of these networks in expanding technology-based capabilities...

Words: 2759 - Pages: 12

Free Essay

Wind Mobile

...Wireless!Communication!Industry!in!Canada! Meizhang!Xing!(1000583889)! ! Executive!Summary! Hello!Mr.!Liu,! I!am!honered!that!you!trust!my!ability!enough!to!give!me!this!opportunity.!After!my!detailed!research!and!analysis,!I!do!feel!that!it!is! indeed!worthwhile!to!learn!about!the!wireless!communication!industry!as!well!as!WIND!Mobile.!I!will!presnet!you!with!my!findings! from!the!following!three!aspects!:!! 1. 2. 3. Current!industry!environment!:!rapid!growth!;!oligopolistic!structure! Wireless!communication!industry’s!strong!profit!generation!ability!:!revenue!growth!;!EBITDA!margin!growth! WIND!Mobile’s!development!and!potentiality:!stable!corporate!structure;!competitiveness! ! ! In!my!opinion,!the!above!three!question!needs!to!be!answered!to!make!an!informed!decision!about!the!investment.!I!do!hope!my! research!can!help!you!convince!your!partners!to!investigate!in!the!Canadian!wireless!industry!and!WIND,!and!eventually!decide!on! whether!or!not!to!invest!in!WIND.! 1.!Current!Industry!Enviroment! a.!Rapid!development:!! !! ! ! ! Cell!phone!penetraeon:! In!2013,!83%!of!Canadian! households!had!an!aceve!cell!phone,! up!from!78%!in!2010.! In!2013,!21%!of!households!reported! using!a!cell!phone!exclusively,!up! from!13%!in!2010.! Data!traffic:!! Mobile!data!traffic!will!grow!900%! from!2013!to!2018,!a!compounded! annumal!growth!rate!of!54%.! Employment:!! Telecommunicaeon!field! employment!would!grow!from! 64,100!people!today!to!110,000!by! 2019!ability.!! (http://cwta...

Words: 1602 - Pages: 7

Premium Essay

None

...Chapter 1 First Look at Computer Parts and Tools Reviewing the Basics 1. Which is faster, a Hi-Speed USB port or a SuperSpeed USB port? SuperSpeed USB is faster than Hi-Speed USB 2. What type of output does a S/PDIF port provide? High quality sound to an audio system 3. List five types of video ports. VGA, S-Video, DVI, HDMI, DisplayPort video ports 4. What is the purpose of an expansion slot on a motherboard? An expansion slot on a motherboard is used for an expansion card, which provides a port or other function that is not provided by the motherboard. 5. What should be the setting for a dual-voltage selector switch on a power supply when using the computer in the United States? Set the switch to 115 volts 6. What unit of measure is used to describe the amount of work a surge suppressor can do before it stops protecting the circuit from an electrical surge? Joule 1 7. Hot wires in home wiring are normally colored ____ and ground wires in computers are normally colored _____. Black, black 8. What is the difference between a transformer and a rectifier? Which are found in a PC power supply? A rectifier is a device that converts alternating current to direct current. A transformer is a device that changes the ratio of current to voltage. A computer power supply functions as both. 9. What device can you use to make sure a computer is protected against power surges? A surge suppressor 10. A power supply receives 120 volts of ___ power from a wall outlet and converts it to...

Words: 883 - Pages: 4

Premium Essay

Term Paper

...estimated to be $3.85 trillion in 2008. The service revenue of the global telecommunications industry was estimated to be $1.7 trillion in 2008, and is expected to touch $2.7 trillion by 2013. Among those an important player in this global industry is Verizon Wireless being the second largest provider of mobile phones service in United States. Headquartered in Basking Ridge, N.J., Verizon Wireless is a joint venture of Verizon Communications (NYSE: VZ) and Vodafone (NYSE and LSE: VOD). Verizon Wireless must to maintain its competitive advantage in this dynamic global environment and if possible to increase its market share against active competitors. Therefore it is a must to focus on new projects and technology which gives a sense of success. In this memo we would like to recommend that a new project be considered for inclusion into Network Development portfolio to address the increasing market demand for new technology and quality of products and services provided by Verizon Wireless. We do realize it may require that another project be delayed to allow for this new product to take advantage of the market opportunity by the end of 2011. Portfolio Management Process (including selection criteria) Verizon Wireless is committed in bringing the blazingly fast speed of 4G LTE to major cities across the country.  In this commitment, Verizon’s PMO recognizes the need for Portfolio Management Process to analyze projects that are being worked on and also in the pipeline to align...

Words: 2487 - Pages: 10

Free Essay

Wi Fi Sector

...antennas provide an attractive solution to increase wireless network capacity through interference mitigation. Despite their increasing popularity, the real-world performance characteristics of such antennas in dense wireless mesh networks are not well understood. We demonstrate our multi-sector antenna prototypes and their performance through video streaming over an indoor wireless network in the presence of interfering nodes. We use our graphical tool to vary the sender, receiver, and interferer antenna configurations and the resulting performance is directly visible in the video quality displayed at the receiver. Categories and Subject Descriptors C.2.1 [Network Architecture and Design]: Wireless Communication; C.4 [Performance of Systems]: Measurement Techniques We have developed a demonstrator that complements our previous measurement campaigns [3, 4] and its primary goal is to demonstrate the operation, the challenges, and the resulting performance of sectorized antennas in real-world dense 802.11 wireless mesh networks. We have designed a four-sector antenna [2] for operation in the 5GHz band with off-the-shelf 802.11 wireless cards. We equip a number of wireless nodes with these antennas and place them in vicinity of each other. We stream video content from a sender to a receiver in the presence of an interfering node while varying antenna configuration (i.e., sector activation) at these nodes. The perceived video quality is affected by changes of the antenna configurations...

Words: 1079 - Pages: 5

Free Essay

Week2Itm130

...CHAPTER 4 1. Why is a focus on information systems insufficient in networking? Because the network professionals often has to focus on the broader business system in which the information system is embedded. 2. Compare trends in network demand and network budgets. The network demand is likely to grow rapidly in the future, just as it has always done in the past. The network budgets are growing very slow 3. What are QoS metrics? (Do not just spell out the acronym.) QoS metrics stands for quality-of-service metrics that is metrics that is quantitative measures of network performance. For instance, companies use QoS metric to quantify their quality of service so that they can set targets and determine if they have met those taargets 4. a. In what units is transmission speed normally measured? Speed measured in factor of 1,000 not 1024 b. Is speed normally measured in bits per second or bytes per second? Bits per second c. Give the names and abbreviations for speeds in increasing factors of 1,000. Kbps: kilobits per second- 1,000 bps Mbps: megabits per second- 1,000 kbps Gbps: gigabits per second- 1,000 Mbps Tbps: terabits per second- 1,000 Gbps d. What is 55,000,000,000 bps with a metric prefix? 55Gbps e. Write out 100 kbps in bits per second (without a metric prefix). 100, 000 bps f. Write the following speeds properly: 0.067 Mbps, 23,000 kbps, and 48.62Gbps...

Words: 5126 - Pages: 21

Free Essay

Set Up a Lan

...SET UP A SMALL OFFICE LAN Final Project SET UP A SMALL OFFICE LAN Final Project Jorge Acevedo CMIS 435 Jorge Acevedo CMIS 435 Table of Contents INTRODUCTION OVERVIEW NETWORK ARCHITECTURE NETWORK STRUCTURAL DESIGN HARDWARE AND SOFTWARE WORKSTATION COMPUTERS NOTEBOOK MULTI-FUNCTION PRINTER VoIP TELEPHONE SWITCH SERVER STORAGE BACKUP WIRELESS ROUTER FIREWALL PROTECTION CABLING AND CONNECTORS SECURITY INTERNET SERVICE PROVIDER CONCLUSION REFERENCES I. Introduction The current design consists of an Intel personal computer with Windows 7 as the operating system and accessing Internet services at 56 kbps modem speeds. The objective is to upgrade to a faster solution through the use of Ethernet Cable and Wireless 802.11n; deploy properly a Local Area Network using the necessary technology, hardware and software specifications, appropriate protocols and group policies; and combined wired and wireless communications to include Internet services provided by an Internet Service Provider. Overview The incorporated network consists of workstations, printer, scanner, fax and copier bundle; telephone capabilities; server management and protocols. The network would be configured to manage users, files, folders and printer sharing options to include a well implemented security system to prevent intrusion of cyber threats such as unauthorized users, viruses and spillage of information. A client-server oriented local area network architecture allows for...

Words: 3182 - Pages: 13

Premium Essay

Nt1330 Unit 5 Assignment

...For example, 802.3 is wired Ethernet and 802.11 is for wireless LANs (WLANs), also known as Wi-Fi. The 802.15 group of standards specifies a variety of wireless personal area networks (WPANs) for different applications. For instance, 802.15.1 is Bluetooth, 802.15.3 is a high-data-rate category for ultra-wideband (UWB) technologies, and 802.15.6 is for body area networks (BAN). There are several others. The 802.15.4 category is probably the largest standard for low-data-rate WPANs. It has many subcategories. The 802.15.4 category was developed for low-data-rate monitor and control applications and extended-life low-power-consumption uses. The basic standard with the most recent updates and enhancements is 802.15.4a/b, with 802.15.4c for China, 802.15.4d for Japan, 802.15.4e for industrial applications, 802.15.4f for active (battery powered) radio-frequency identification (RFID) uses, and 802.15.4g for smart utility networks (SUNs) for monitoring the Smart Grid. All of these special versions use the same base radio technology and protocol as defined in...

Words: 649 - Pages: 3

Free Essay

Telecom Report

.................................... iii Executive Summary & Trends at a Glance............................................................................ iv Chapter 1: Subscription Data ......................................................................................................1 Section A: Access Service – An Overview ..................................................................2 Section B: Wireless Service............................................................................................7 Section C: Wireline Service ..........................................................................................17 Section D: Internet Service ..........................................................................................23 Section E: Other Value Added Services – PMRTS & VSAT................................29 Chapter 2: Revenue and Usage..................................................................................................32 Section A: GSM – Full Mobility Service....................................................................33 Section B: CDMA – Full Mobility Service ................................................................38 Section C: Internet Services ........................................................................................42...

Words: 9906 - Pages: 40

Free Essay

Network Plus

...3af states the specifications for which of the following? a) Quality of Service b) VLANs c) Routing tables d) Power over Ethernet Question 2. Objective: Given a scenario, troubleshoot common router and switch problems. A user's remote marketing server has changed IP address schemes and now the user can no longer access it. The user further discovers that the distant end still has access to them. Which of the following is a possible cause? a) SNMP strings need to be added b) Firewall rules need to be configured c) Port bonding on the interface needs to be enabled d) The switch has lost power Question 3. Objective: Explain the purpose and features of various network appliances. Which of the following is a network device that allows remote users access to a network? a) DNS server b) Content filter c) Load balancer d) VPN concentrator Question 4. Objective: Given a scenario, use the appropriate network monitoring resource to analyze traffic. A technician suspects that a virus has been introduced on the network. Which network resource is BEST used to confirm this problem? a) Syslog b) SNMP c) Network sniffer d) Environmental monitor Question 5. Objective: Given a scenario, implement the following network troubleshooting methodology. A user reports a network connectivity problem. Which of the following steps should the technician perform FIRST? a) Determine a probable cause b) Implement the solution of the cause c) Test the theory of the...

Words: 1379 - Pages: 6

Premium Essay

Cmgt 445

... Implementation Plan Project Name: Wireless Network Access for Lab off-site and on-site shuttles Project Stakeholders * Jim Dahlgard * Facilities Resource Manager * JMDahlgard@lbl.gov * Kory Porter * Logistics Manager * KJPorter@lbl.gov * Bill Llewellyn * Site Services Manager * William_Llewellyn@lbl.gov * Jerry OHearn * Project Director * JOhearn@lbl.gov * Chris Peach * IT Services * CPeach@lbl.gov Project Description * The purpose of this project is to provide wireless Internet access to all student and business travelers using the Lab provided shuttle bus service. * The main challenge of this project will be to install wireless technology on the buses without negatively impacting shuttle service. * The desired outcome of this project is to improve productivity for students, researchers, and Lab employees while...

Words: 972 - Pages: 4

Premium Essay

Mobile Computing Issues

...Introduction Issues in Mobile Computing • There are several characteristics of wireless networks and mobile devices that give rise to issues that do not pose a problem in fixed, wired infrastructure. – Adaptive behaviour p – Battery power – Limitation on local resources – Small display size – Disparity in the availability of remote services – Unpredictable variation in QoS. 1 WRES3405 (3) 2 WRES3405 (3) Adaptive Behaviour • Adaptability is critical to support pervasive computing. • Pervasive computing extends the problem domain: – – – – Effective use of smart space space. Invisibility. Localised scalability. Masking uneven conditioning. • Adaptive behaviour arises due to a significant mismatch between supply and demand for resources. – Often in low level systems, e.g. bandwidth, memory. • As a mobile user moves, services and resources may become available or disappear. • Mismatch may occur even when the user is static static. • The system has to handle the variation in a way that minimises inconvenience to users and does not abruptly interfere with the task the user is trying to accomplish. WRES3405 (3) 3 WRES3405 (3) 4 • Other reasons for a mismatch: – The availability of compute servers or data-staging server is location-dependent and affects techniques such as cyber foraging. – In case of mobile code, low-level resources and interactive resources may vary widely between the source and destination systems. As time elapses, the resource level may...

Words: 2198 - Pages: 9