Solved

When did telephone systems start carrying more data than voice traffic?

Posted on 2011-03-14
3
310 Views
Last Modified: 2012-08-14
Help me solve a bet, my buddy told me that in 1970, telephone systems were carrying more data traffic than voice. I claim that at the earliest it had to have been the 1980's when the Internet started to take off in the edicational community. A case of beers are on the line here...Thanks.
0
Comment
Question by:WilliamK99
3 Comments
 
LVL 29

Accepted Solution

by:
Rich Weissler earned 500 total points
ID: 35132096
Wow.  That'll be a difficult question to answer.
 - When you say the telephone systems, do you mean over the switched service telephone system?  Frame Relay might count, but I assumed leased lines wouldn't... yes?
 - When I think old data communication, I think of old x.25 traffic.  Does FAX count as data?
 - ISDN was never a major contributor... but are you gonna count ISDN lines as voice or data?
 - I probably started to count outside the time-frame you are considering... but as folks start to transmit real-time voice traffic over data networks...

But looking at what folks have claimed -- AT&T Labs says you are both wrong:
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.4457
"A doubling of traffic each year represents extremely fast growth, much faster than the increases
in other communication services. If it continues, data traffic will surpass voice traffic around the year
2002
."  Given that the paper was written in 2001... we'll I'd say, from that paper, it's well after the 1980s.

But again, depending on how you measure things, the answer is slippery.  If I were you, I'd split the cost of the beers, and drink them together.
0
 
LVL 68

Expert Comment

by:Qlemo
ID: 35360944
This question has been classified as abandoned and is being closed as part of the Cleanup Program. See my comment at the end of the question for more details.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

This is an article about my experiences with remote access to my clients (so that I may serve them) and eventually to my home office system via Radmin Remote Control. I have been using remote access for over 10 years and have been improving my metho…
Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now