Fact-checked by Grok 2 weeks ago

Trunking

Trunking is a fundamental technique in and computer networking that enables multiple signals, calls, or data streams to be multiplexed and transmitted over a single physical or logical communication link, such as a , optic line, or , to optimize utilization and increase overall . This approach originated in early analog systems, where lines connected central offices to handle shared voice traffic efficiently, reducing the need for dedicated lines per user. In , trunking refers to the aggregation of multiple voice channels into a shared pathway, often using (TDM) in traditional public switched telephone networks (PSTN) or (SIP) for modern (VoIP) systems, allowing businesses to connect private branch exchanges (PBXs) to the PSTN without physical lines. , in particular, supports unlimited concurrent calls over connections, replacing legacy TDM trunks and providing with quality-of-service controls. These trunks typically consist of bundled wires, coaxial cables, or optical fibers capable of carrying dozens to thousands of simultaneous signals. In computer networking, trunking commonly describes the configuration of trunk ports on switches and routers to carry traffic from multiple virtual local area networks (VLANs) across a single Ethernet link, using protocols like for frame tagging to segregate and route data accurately. This method enhances for security and performance, allowing VLANs to span devices without requiring separate physical connections. , or port trunking under standards like IEEE 802.3ad (now 802.1AX), further bundles multiple physical links into a logical to boost and provide . Beyond wired systems, trunking applies to wireless communications, particularly in (PMR) and land mobile radio networks, where a central controller dynamically assigns available radio frequencies from a shared pool to users, improving spectrum efficiency and supporting up to 100 mobile units per channel while minimizing access delays. This form of trunking, common in public safety and sectors since the 1990s, can increase traffic capacity by fivefold compared to non-trunked systems without compromising . Overall, trunking's versatility across these domains underscores its role in enabling scalable, cost-effective communication infrastructures.

Fundamentals

Definition and principles

Trunking refers to the technique of aggregating multiple individual signals, channels, or data streams into a single shared pathway or to enable efficient between communication points. This approach optimizes resource utilization by allowing a limited number of physical or logical channels to serve a larger number of users or connections, thereby reducing infrastructure costs and improving overall system performance. In essence, trunking transforms dedicated lines into multiplexed conduits capable of handling simultaneous traffic from diverse sources. The fundamental principles of trunking revolve around statistical multiplexing, load balancing, and enhanced efficiency in or usage. Statistical multiplexing operates on the premise that not all potential users require access to the shared pathway at the same moment, enabling dynamic allocation of resources based on demand rather than fixed reservations. This contrasts with deterministic methods by leveraging probabilistic usage patterns to minimize idle . Load balancing distributes across the trunk to prevent overload on any single segment, while efficiency is quantified through models like Erlang's , which estimates the required to meet levels. The Erlang B calculates the blocking probability as B(C, A) = \frac{A^C / C!}{\sum_{k=0}^C A^k / k!}, where C is the number of circuits and A is the offered in Erlangs; the number of circuits needed is determined by solving for C given a target blocking probability. For large A, approximations such as C \approx A + z \sqrt{A} (with z related to the desired blocking probability) can be used. Trunking can be broadly categorized into circuit-switched and packet-switched variants, as well as deterministic and statistical allocation schemes. In circuit-switched trunking, a dedicated path is established for the duration of a , ensuring predictable but potentially underutilizing resources during low-activity periods. Packet-switched trunking, conversely, breaks into packets routed independently over the shared , allowing for more flexible and bursty handling. Deterministic allocation assigns fixed slots or regardless of usage, whereas statistical methods adaptively share , prioritizing needs to achieve higher throughput. The primary advantages of trunking include significant cost savings from shared , which lowers the need for dedicated lines per user, and that supports growing volumes without proportional increases. However, it introduces risks such as potential during peak usage, leading to delays or dropped , and creates a where trunk disruption affects all multiplexed signals. These principles underpin trunking's applications across , computer networking, and radio communications.

Historical development

The concept of trunking originated in 19th-century , where trunk lines served as shared pathways for multiple messages over a single wire, enhancing efficiency in long-distance communication. As early as the 1850s, telegraph cables enabled multiplexed transmissions across oceans, with innovations like Émile Baudot's system in 1874 allowing up to six simultaneous messages on one line. By the late 1800s, and other companies had developed duplex and quadruplex systems to double or quadruple capacity on trunk lines, fundamentally establishing multiplexing as a core principle for resource sharing in wired networks. Trunking principles transitioned to in the 1880s, coinciding with the widespread adoption of manual switchboards that connected local exchanges via dedicated trunk lines for interurban calls. In the , the National Telephone Company began deploying trunk networks in the early 1890s, building on earlier American experiments where Alexander Graham Bell's systems used trunk lines to link cities starting from 1878. marked a pivotal advancement with the development of automatic trunking in exchanges, exemplified by crossbar switching systems that enabled electromechanical selection of trunks without intervention, reducing delays and scaling capacity in urban networks. Post-World War II, trunking expanded dramatically through microwave relay systems, which multiplexed dozens of voice channels over line-of-sight radio links, facilitating nationwide networks like those deployed by in the late 1940s and 1950s. The 1970s ushered in digital trunking with the widespread adoption of T-carrier systems, starting with the T1 line introduced by Bell Labs in 1962 but proliferating for trunk applications by the decade's end, digitizing 24 voice channels at 1.544 Mbit/s for more reliable long-haul transmission. This shift influenced data networks in the 1960s, where trunking concepts were adapted for early packet-switched systems like ARPANET, using leased telephone trunks to interconnect computers and enable shared bandwidth for research data flows. By the 1980s, trunking extended to mobile radio systems, with the FCC issuing the first trunked licenses in 1979, allowing dynamic channel allocation to improve spectrum efficiency by up to 2-3 times over conventional systems, supporting growing public safety and commercial demands. These evolutions were driven by technological breakthroughs, including the transistor's commercialization in the 1950s, which enabled compact digital switches for trunks, and fiber optics in the 1970s, offering capacities in the Mbps range that surpassed copper wire limitations and enabled dramatic scaling in later decades. Regulatory changes, such as the 1984 AT&T divestiture, further reshaped trunking economics by fostering competition in long-distance services, reducing access charges by over 50% by 1991 and incentivizing efficient trunk deployment among regional carriers.

Telecommunications

Telephone trunking

Telephone trunking refers to the use of dedicated or shared circuits, known as trunk lines, to interconnect switching centers such as central offices or private branch exchanges (PBXs) for the purpose of voice traffic in circuit-switched networks. These trunks provide pathways for multiple simultaneous calls, enabling efficient handling of inbound and outbound traffic between exchanges. A key feature in PBX-integrated systems is (DID), which routes external calls directly to specific internal extensions without operator intervention, and direct outward dialing (DOD), which allows internal users to place external calls directly from their extensions. This setup optimizes resource use by reducing the need for dedicated lines per user while supporting scalable connectivity for organizations. In the analog era, telephone trunking primarily relied on multi-channel analog systems employing (FDM) to combine multiple voice signals onto a single , such as cables or links, allowing dozens or hundreds of calls to share the path by allocating distinct frequency bands to each channel. This approach was essential for long-distance transmission, where trunk calls—long-distance connections in systems like those in the UK and countries—were billed based on distance, duration, and time of day to reflect costs. For instance, in 1958, a three-minute trunk call in the UK was priced at 2s 6d (approximately 12.5 pence), with dialing introduced to lower costs and expand access. Such cost models incentivized off-peak usage and gradual expansion to meet growing demand. Capacity planning for telephone trunks draws on statistical multiplexing principles, where traffic variability is modeled to avoid excessive blocking of calls. The seminal Erlang B formula, developed by A.K. Erlang, calculates the probability of call blocking in a loss system with no queueing, guiding the dimensioning of trunk groups. The formula is derived from the arrival of calls and holding times, yielding the steady-state blocking probability under the Erlang loss model: P_b = \frac{\frac{A^B}{B!}}{\sum_{k=0}^{B} \frac{A^k}{k!}} Here, P_b is the blocking probability, A is the offered traffic load in Erlangs (representing the average number of concurrent calls), and B is the number of available trunks. Erlang introduced this in his 1917 paper addressing automatic telephone exchange probabilities. For example, to achieve a 1% blocking probability with 10 Erlangs of traffic, approximately 18 trunks are required, illustrating how the formula balances cost and service quality. Integration with PBXs involved tie lines, which are direct telecommunication circuits linking multiple PBXs to form a , enabling seamless extension-to-extension calling across sites without public network . Off-premise extensions (OPX) extended this capability by providing dedicated circuits from a remote location to the main PBX, treating the distant phone as an on-site extension with full access to PBX features like transfer and conferencing. The transition from analog to digital trunking accelerated in the 1970s and 1980s, driven by (PCM) systems that digitized voice for trunks, improving signal quality and capacity; early implementations like the D960 system in the early 1970s used PCM to multiplex 96 channels over digital lines. This shift laid the groundwork for more efficient, noise-resistant long-haul transmission while maintaining compatibility with existing analog endpoints.

Digital and packet trunking

Digital trunking in employs (TDM) techniques with digital signaling to aggregate multiple voice or channels over high-capacity lines. The T1 carrier, standardized in , operates at 1.544 Mbps and multiplexes 24 DS0 channels, each providing 64 kbps for uncompressed voice, along with framing overhead. In and internationally, the E1 carrier runs at 2.048 Mbps, accommodating 32 time slots: 30 for DS0 voice channels and 2 for signaling and synchronization. (ISDN) builds on these carriers, with (PRI) offering 23 bearer (B) channels plus 1 (D) channel for signaling on T1 (totaling 1.536 Mbps ) and 30 B channels plus 1 D on E1 (1.92 Mbps ), while (BRI) supports 2 B channels and 1 D channel at 192 kbps for smaller-scale digital connectivity. Packet trunking shifts from circuit-switched TDM to IP-based protocols, enabling efficient transport of voice over IP (VoIP) and data. (SIP) trunking, defined in RFC 3261, replaces traditional physical lines by establishing virtual connections over the to the (PSTN), allowing simultaneous voice calls without dedicated . This approach offers scalability by dynamically allocating bandwidth as needed—adding channels via software rather than installing new lines—and reduces costs by eliminating per-minute charges and maintenance, potentially lowering expenses by up to 50-70% for high-volume users compared to TDM. Modern implementations integrate packet trunking with cloud-based systems for enhanced flexibility. seamlessly connects with cloud private branch exchange (PBX) platforms, enabling remote access and without on-premises equipment, as supported by IETF guidelines for enterprise configurations. In networks, core trunking handles backhaul traffic between radio access and the core, using /MPLS protocols as defined in TS 23.501 to aggregate user plane data, with capacities scaling to tens of Gbps per site as of and projected to exceed 100 Gbps, supporting low-latency services like ultra-reliable communications. Security remains critical, with (TLS) encrypting signaling (as in SIPS URIs) and (SRTP) protecting media streams against , per 3711 standards. The migration from TDM to IP trunking accelerated in the 2000s, driven by broadband proliferation and VoIP adoption, reducing operational costs and improving efficiency. Globally, carriers decommissioned TDM infrastructure post-2010, with IP traffic surpassing voice by 2015. As of 2025, major carriers such as are continuing to phase out TDM and copper-based infrastructure, with plans to discontinue legacy services across their networks to fully transition to IP.

Computer networking

In computer networking, combines multiple physical Ethernet links into a single logical link to enhance throughput and provide redundancy, allowing devices to treat the bundle as one interface. This technique, also referred to as port trunking or link bonding, ensures that all aggregated links operate at the same speed and in full-duplex mode to maintain compatibility. The IEEE 802.1AX standard defines the protocols and mechanisms for this capability, evolving from the earlier IEEE 802.3ad specification to support various MAC types while remaining independent of specific link-layer details. The primary protocol for dynamic link aggregation is the Link Aggregation Control Protocol (LACP), which enables automatic negotiation between connected devices to form and maintain aggregation groups by exchanging control packets. In contrast, static aggregation modes require manual configuration on both endpoints without protocol negotiation, simplifying setup in controlled environments but lacking automatic failure detection. Traffic distribution across the bundled links relies on load-balancing algorithms, typically based on hashing values derived from packet headers such as source and destination MAC addresses, IP addresses, or TCP/UDP ports, to optimize utilization and prevent bottlenecks on individual links. Link aggregation offers fault tolerance by rerouting traffic to remaining active links if one fails, ensuring seamless without disrupting connectivity, which is critical for high-availability environments. Common use cases include aggregating uplinks from servers to switches or interconnecting core routers to scale in data centers, where it supports up to eight links per group in most implementations to balance performance and manageability. For example, in enterprise networks, it enables higher aggregate throughput for bandwidth-intensive applications like or traffic. Cisco's EtherChannel serves as a widely adopted implementation of , supporting both LACP and static modes to bundle ports on switches for enhanced reliability. The aggregate bandwidth equals the sum of the individual link capacities—for instance, four 1 Gbps full-duplex links provide up to 8 Gbps bidirectional throughput—but actual performance depends on the hashing algorithm's effectiveness in distributing diverse traffic flows. This approach avoids the misconception of full duplex inherently doubling per-link capacity within the bundle, as each link independently supports simultaneous transmit and receive operations.

VLAN trunking

VLAN trunking enables the transmission of traffic from multiple (s) over a single physical Ethernet link between network devices, such as switches, to efficiently utilize bandwidth and extend boundaries across a (). This technique is essential in enterprise environments for logical without requiring separate physical connections for each . The primary standards and protocols governing trunking include the and the proprietary Inter-Switch Link (), with 802.1Q serving as the open, widely adopted method. The standard defines tagging by inserting a 4-byte into the header, specifically between the source and the field, to identify the association. This consists of a 2-byte Tag Protocol Identifier (TPID) set to 0x8100, a 2-byte Tag Control Information field that includes a 3-bit priority (PCP) for and a 1-bit drop eligible indicator, followed by a 12-bit Identifier (VID) that supports up to 4096 possible (VID values 0-4095, though 0 and 4095 are reserved). For untagged frames on a link, the native —typically 1 by default—carries the traffic without modification, allowing legacy or non--aware devices to communicate while preserving compatibility. This insertion increases the frame size by 4 bytes, which may require enabling jumbo frames on devices to avoid fragmentation. In contrast, Cisco's protocol, introduced as a encapsulation method for inter-switch links, fully encapsulates the original with a 26-byte header and a 4-byte trailer, adding fields for ID, user priority, and frame length without altering the inner frame. Unlike 802.1Q's header insertion, ISL's approach preserves the original frame intact but results in larger overhead (30 bytes total added), making it less efficient for modern networks. ISL has been deprecated in favor of the interoperable standard, as it limits connectivity to devices and lacks support in newer hardware. Configuration of VLAN trunking involves designating ports as either trunk or access types on Ethernet switches. Trunk ports are configured to carry tagged traffic from multiple VLANs, using commands like "switchport mode trunk" in Cisco IOS, while access ports belong to a single VLAN and send/receive untagged traffic exclusively, configured via "switchport mode access" and "switchport access vlan [ID]". To optimize performance and prevent unnecessary broadcast traffic, administrators can specify an allowed VLAN list on trunk ports with "switchport trunk allowed vlan [list]", restricting traversal to only permitted VLANs and mitigating broadcast storms that could propagate across unused VLANs. By default, all VLANs (1-4094) are allowed on trunks unless explicitly filtered. Security considerations in VLAN trunking include risks such as attacks, where attackers exploit misconfigurations to access unauthorized . Double-tagging attacks involve crafting frames with an outer tag matching the native and an inner tag for a target , allowing injection into unintended segments if native mismatch across trunks. Switch spoofing occurs when a negotiates a trunk mode using Dynamic Trunking (DTP), enabling it to receive traffic from multiple ; mitigation involves disabling DTP and explicitly setting ports to access mode where possible. A key limitation is the 12-bit VID field in 802.1Q, capping usable at 4094 (excluding reserved values), which can constrain large-scale deployments despite supporting up to 4096 identifiers theoretically. In campus networks, trunking facilitates segmentation for departments or functions, such as separating voice, data, and guest traffic, while integrating with techniques like for higher throughput on inter-switch links.

Radio communications

Trunked radio systems

Trunked radio systems represent an advanced form of communication designed to optimize the use of a limited pool of radio among multiple users or groups, particularly in land mobile radio applications such as public safety and business operations. Unlike conventional radio systems, where each user group is assigned a fixed that remains dedicated regardless of usage, trunked systems employ dynamic allocation to share more efficiently. A key component is the dedicated control , which continuously broadcasts system status and handles requests from mobile stations (radios) for communication setup. Users are organized into talkgroups—logical groupings of radios that allow targeted conversations without interfering with other groups—enabling seamless switching between conversations on shared . In operation, a monitors the control when idle. When a user initiates a call by pressing the push-to-talk button, the radio transmits a channel request containing the talkgroup ID and priority level (if applicable) over the control . The central site controller, which oversees channel assignments, scans for an available voice or from the shared pool and responds via the control , instructing the requesting radio and all relevant talkgroup members to retune to the assigned . This process typically occurs in seconds, minimizing setup time. If no channels are free, the system employs queueing mechanisms, where calls wait in order of priority— transmissions, for instance, lower-priority requests to ensure rapid access. Site controllers at individual stations manage local assignments, coordinating with the central controller to maintain system integrity and handle handoffs if needed. Several standards govern trunked radio implementations, tailored to regional and operational needs. In , MPT-1327, developed by the UK's Department of Trade and Industry in 1988, serves as a foundational analog signaling for trunked land systems, utilizing a beacon-like control for call setup, registration, and short services in networks with 6.25 kHz or wider spacing. EDACS (Enhanced Digital Access Communications System), introduced by (formerly ) in the mid-1980s, supports both analog and digital modes across VHF, UHF, 800 MHz, and 900 MHz bands, featuring a dedicated control per site for continuous signaling and command distribution to mobiles. Motorola's SmartZone, an evolution of the SmartNet architecture, enables multi-site trunking for wide-area coverage, with dynamic roaming and site selection managed through a central controller, operating primarily in 800/900 MHz bands but adaptable to VHF and UHF. These systems commonly utilize VHF (138-174 MHz) and UHF (403-512 MHz) frequency bands to balance coverage and penetration in diverse environments. The primary advantage of trunked radio systems lies in their efficiency, achieved through statistical that accommodates varying loads without dedicating channels to idle groups. Compared to conventional systems, trunking can improve spectrum utilization by 2 to 10 times, depending on the number of channels (typically 5-30 per ) and traffic intensity, as measured by Erlang capacity models that account for call duration and blocking probabilities. For example, a 20-channel trunked might support 50-100 users per talkgroup with acceptable blocking rates (e.g., 2% under Erlang B), far exceeding the mapping of conventional setups. Blocking is mitigated through queuing, where higher-priority calls (such as emergencies) are granted immediate access, while others wait or receive a , ensuring reliable operation in high-demand scenarios. This efficiency stems from the control channel's role in , reducing idle time and enabling frequency reuse across talkgroups.

Multi-site and advanced implementations

Multi-site trunking extends the coverage of trunked radio systems beyond single-site limitations by linking multiple base stations or repeaters, often using IP backhaul for efficient data transport and coordination. In TETRA standards, multi-site operation supports roaming across location areas within a network, where mobile stations update their registration upon entering a new cell without interrupting service, enabling seamless mobility management through infrastructure signaling. Simulcast techniques in TETRA transmit identical signals from multiple sites simultaneously to form a unified coverage zone, facilitating group calls with fast setup times of around 300 ms and imperceptible handovers during speech. Similarly, Project 25 (P25) multi-site trunking employs simulcast to synchronize transmissions across sites using shared radio channels, eliminating the need for user-initiated roaming in the coverage area and improving spectral efficiency—for instance, a 10-channel system maintains that allocation regardless of the number of sites. The Inter-RF Subsystem Interface (ISSI) in P25 further enables interconnection of disparate trunked systems, allowing roaming between subsystems while preserving home network affiliations for mutual aid scenarios. Digital trunking advancements in standards like (DMR) Tier III and enhance multi-site capabilities with integrated voice and services. DMR Tier III employs a centralized controller to manage across sites, supporting , for secure communications, and GPS for location tracking in applications such as . trunking, particularly in its Gen2 variant, leverages networks to connect up to 1,000 sites for wide-area , incorporating digital voice scrambling, , and GPS to enable features like positioning and short messaging. These systems transition from analog by providing while adding packet optimized for low-bandwidth environments, with algorithms ensuring in deployments. Contemporary implementations of multi-site trunking emphasize public safety and commercial applications, often integrating with networks. In the United States, FirstNet, launched in 2018 as a nationwide LTE-based platform dedicated to public safety, interconnects with legacy P25 trunked systems to extend coverage and enable push-to-talk over cellular, supporting seamless transitions between land mobile radio and for . As of March 2025, FirstNet surpassed 7 million connections, with ongoing expansions enhancing coverage and performance for . Commercial fleets utilize and for multi-site coordination in logistics, where GPS-enabled trunking optimizes routing and across large areas. Emerging integrations via private networks adapt trunking principles for mission-critical communications, as outlined in specifications for Push-to-Talk (MCPTT) over , which support group calling, roaming, and data services in dedicated slices for public safety, enhancing latency-sensitive operations like emergency dispatching. Despite these advances, multi-site trunked radio systems face challenges in scanning and . monitoring trunked channels encounter difficulties due to dynamic channel allocation and timing synchronization, which can cause signal distortion or missed handoffs in overlap zones, complicating hobbyist or auxiliary monitoring. issues arise from vendor-specific implementations and frequency band differences, though standards like P25 ISSI and 's air mitigate this by standardizing interfaces for cross-system . In European networks post-2000, widespread adoption for public protection and disaster relief (PPDR) has highlighted the need for harmonized spectrum allocation to address gaps between national systems, as seen in cross-border operations requiring inter-operator agreements for seamless service continuity.

References

  1. [1]
    What is Trunking? – Definition from WhatIs.com - TechTarget
    Sep 7, 2021 · A network trunk is a communications line or link designed to carry multiple signals simultaneously to provide network access between two points.
  2. [2]
  3. [3]
    What is a trunk? - Genesys
    A trunk is a communication line or physical link, such as a wire or optical line, designed to carry multiple signals simultaneously.
  4. [4]
    [PDF] Configuring VLAN Trunks - Cisco
    Ethernet trunks carry the traffic of multiple VLANs over a single link, and you can extend the VLANs across an entire network. You can configure a trunk on a ...Missing: definition | Show results with:definition
  5. [5]
    802.1AX-2020 – Link Aggregation |
    This standard defines the MAC-independent Link Aggregation capability and general information relevant to specific MAC types that support Link Aggregation.
  6. [6]
    [PDF] TELECOMMUNICATION DEVELOPMENT BUREAU - ITU
    Jul 27, 1998 · The term "Trunking" is used to describe the procedure whereby a user wishing to make a call can gain immediate access to whichever one of a ...
  7. [7]
    How does trunking work? - Tait Radio Academy
    Trunked networks get their name from the world of telephony. Traditionally two cities would bundle their connections together into a single thick line like ...
  8. [8]
    [PDF] 1.4. GOS and Trunking Efficiency - Communication Lab
    Trunking efficiency is the maximum traffic intensity a system carries with a given Grade of Service (GOS). It's affected by channel grouping.
  9. [9]
    [PDF] A history of electric telegraphy, to the year 1837
    This book, 'A history of electric telegraphy, to the year 1837', by John Joseph Fahie, covers the history of electric telegraphy up to 1837, compiled from ...
  10. [10]
    [PDF] Networking through the New Phone System The Future of ...
    1948 - 1962 - SFB Morse developed the telegraph. Invention of time - division multiplexing by Baudot. Invention of the telephone by Bell. Invention of the ...
  11. [11]
    It's all about the trunks - The Royal Berkshire Archives
    Sep 6, 2022 · Invented in America in 1876, they began to be widely adopted in the United Kingdom in the 1880s, and in the early 1890s, the National Telephone ...
  12. [12]
  13. [13]
    Electromechanical Telephone-Switching
    Jan 9, 2015 · By 1930 every telephone in Manhattan that connected to a central exchange was a dial telephone connected to a panel switch. (Fig.
  14. [14]
    Communications Technologies
    Developments in microwave circuitry during and after World War II ... A 62,000-mile microwave telecommunications system is completed within Saudi Arabia.
  15. [15]
    1951-1970:The Birth of T-carrier - T1: A Survival Guide [Book]
    1. History of the U.S. Telephone Network · 2. T1 Architectural Overview · 3. Basic Digital Transmission on Telephone Networks · 4. Multiplexing and the T-carrier ...
  16. [16]
    Internet History of 1960s
    Simultaneous work on secure packet switching networks is taking place at MIT, the RAND Corporation, and the National Physical Laboratory in Great Britain. Paul ...
  17. [17]
    The Lost Trunking License - MRA - Mobile Relay Associates
    It was 1979 when the FCC granted the very first licenses for operating a trunked radio system. The trunked radio system was a completely new concept.
  18. [18]
    Telephone Transmission - Engineering and Technology History Wiki
    May 2, 2015 · The wires were strung over aerial poles or occasionally roof supports, and attached to cross arms on the poles via glass insulators.
  19. [19]
    What is Direct Inward Dialing/Direct Outward Dialing (DID/DOD)?
    Using DID, a company can offer its customers individual phone numbers for each person or workstation within the company without requiring a physical line into ...
  20. [20]
    FDM Demystified: What is Frequency-Division Multiplexing?
    Sep 8, 2025 · Traditional Telephone Systems (POTS): FDM was used in early trunk lines to carry thousands of voice calls over a single physical cable. FDM vs ...
  21. [21]
    BBC ON THIS DAY | 21 | 1958: Trunk dialling heralds cheaper calls
    All calls will be charged automatically according to both time of call and distance. Prices will start at 2d and a three-minute call will cost 2s 6d, a ...
  22. [22]
    Erlang, A.K. (1917) Solution of Some Problems in the Theory of ...
    Erlang, A.K. (1917) Solution of Some Problems in the Theory of Probabilities of Significance in Automatic Telephone Exchanges.Missing: pdf | Show results with:pdf
  23. [23]
    PBX tie line - IT glossary of terms, acronyms and abbreviations
    n. ☆ 1. a direct telephone line between extensions in two or more PBX systems ☆ 2. a line used to connect one electric power or transportation system ...
  24. [24]
    OPX (Off-Premises Extension) - NENA Knowledge Base
    OPX (Off-Premises Extension) is a dedicated circuit connecting a distant location to a main PBX to provide the same phone system features available at the main
  25. [25]
    [PDF] Handbook on new technologies and new services - ITU
    In 1984 a set of ITU-T standards that specified the details of what an ISDN network is and how it works ... DS0, n*DS0, DS1, E1, DS3. Physical layer. Page 61 ...
  26. [26]
    [PDF] TABLE OF CONTENTS - Federal Communications Commission
    service), ISDN Basic Rate Interface (BRI) and ISDN Primary Rate Interface (PRI). As usage of the Internet increases, other interconnection techniques may ...Missing: DS0 | Show results with:DS0
  27. [27]
    What is SIP Trunking and How Does It Work? - Vonage
    Aug 23, 2025 · SIP (session initiation protocol) trunking allows your business to transmit audio and other types of media using an internet connection.Missing: RFC | Show results with:RFC
  28. [28]
    [PDF] AT&T INC. 2020 ANNUAL REPORT
    Feb 25, 2021 · promote the IP transition through its rules. In September 2019, the FCC released reformed aspects of its intercarrier compensation regime ...Missing: migration | Show results with:migration
  29. [29]
    IEEE 802.1AX-2020 - Link Aggregation
    May 29, 2020 · This standard defines a MAC-independent Link Aggregation capability and provides general information relevant to specific MAC types.
  30. [30]
    Link Aggregation Control Protocol (LACP) (802.3ad) for Gigabit ...
    LACP is part of the IEEE specification 802.3ad that allows you to bundle several physical ports to form a single logical channel. When you change the number of ...
  31. [31]
    Link Aggregation and Load Balancing - Cisco Meraki Documentation
    Oct 25, 2024 · The MS's LACP hashing algorithm uses traffic's source/destination IP, MAC, and port to determine which bonded link to utilize. This provides ...
  32. [32]
    Network Basics: What is Link Aggregation & How Does it Work?
    Oct 23, 2024 · The official IEEE standard for link aggregation used to be called 802.3ad, but is now 802.1AX, as I will explain later. However, several ...
  33. [33]
    What are link aggregation and LACP and how can I use them in my ...
    Jul 7, 2025 · Link Aggregation Control Protocol is an IEEE standard defined in IEEE 802.3ad. LACP lets devices send Link Aggregation Control Protocol Data ...
  34. [34]
    Configuring EtherChannels - Cisco
    Link Aggregation Control Protocol. The LACP is defined in IEEE 802.3ad and enables Cisco devices to manage Ethernet channels between devices that conform to the ...
  35. [35]
    Aggregated Ethernet Interfaces Overview | Junos OS
    IEEE 802.3ad link aggregation enables you to group Ethernet interfaces to form a single link layer interface, also known as a link aggregation group (LAG) ...Overview · Link Aggregation Group (lag) · Example: Configure Link...
  36. [36]
    Trunking Between Catalyst 4500/4000, 5500/5000, and 6500/6000 ...
    May 26, 2006 · This document introduces the concept of trunking between two Ethernet switches and focuses on the IEEE 802.1Q trunking standard.
  37. [37]
    Inter-Switch Link and IEEE 802.1Q Frame Format - Cisco
    Aug 25, 2006 · This document provides the basic information and a summary of the frame fields for Inter-Switch Link (ISL) and IEEE 802.1Q encapsulation.
  38. [38]
    IEEE 802.1Q-2018
    Jul 6, 2018 · This standard specifies how the Media Access Control (MAC) Service is supported by Bridged Networks, the principles of operation of those networks, and the ...
  39. [39]
    VLAN Tag Formats - IEEE 802
    May 16, 1997 · VLAN tags include 12 bits for VLAN identification and 3 bits for priority. Tagging increases frame size by 4 octets.
  40. [40]
    Fundamentals of 802.1Q VLAN Tagging
    Oct 25, 2024 · Mismatched native VLANs on opposite sides of a trunk can inadvertently create "VLAN hopping." This is often a method of intentional attack used ...
  41. [41]
    [PDF] Configuring VLAN Trunks - Cisco
    By default, a trunk port sends traffic to and receives traffic from all VLANs. All VLAN IDs, 1 to 4094, are allowed on each trunk. However, you can remove VLANs ...
  42. [42]
    How to define the VLANs allowed on a trunk link - Cisco Community
    When a trunk link is established, all of the configured VLANs are allowed to send and receive traffic across the link. VLANs 1 through 1005 are allowed on each ...
  43. [43]
    [PDF] Layer 2 Attacks and Their Mitigation - Cisco
    Layer 2 attacks include MAC, VLAN "Hopping", GARP, and Spanning Tree attacks. Layer 2 can be a weak link, and Layer 2 security issues exist.
  44. [44]
    Land Mobile Spectrum Planning Options Appendix
    Trunked systems can establish a communication channel to individual radios or to groups of radios. The groups of radios are called "talk groups". A given radio ...
  45. [45]
    Trunked versus Conventional | Tait Communications Blog
    Oct 17, 2012 · Quite simply, trunked networks can accommodate more users, on fewer channels. Trunked technology efficiently rationalizes spectral congestion, ...
  46. [46]
    [PDF] System Levels Overview - EDACS - Repeater Builder®
    This manual covers Ericsson and General Electric products manufactured and sold by Ericsson Inc. ... EDACS. System have been explained in this document. If the ...
  47. [47]
    [PDF] ETSI TR 102 884 V1.2.1 (2013-02)
    MPT 1327 (June 1997): "A Signalling Standard for Trunked Private Land Mobile Radio Systems". MPT 1318: "Engineering Memorandum, Trunked Systems in the Land ...
  48. [48]
    [PDF] MOTOTRBO™ ANALOG TRUNKED MOBILE RADIOS
    SmartZone includes all SMARTNET features plus wide area seamless roaming, RSSI operation, preferred site and forced site search. VERSATILE FUNCTIONALITY.
  49. [49]