Explain public switched telephone network, Computer Engineering

Assignment Help:

Explain Public Switched Telephone Network.

PSTN (Public Switched Telephone Network): This is Public Switched Telephone Network (PSTN), which accommodates two types of subscribers as: public and private. The subscribers to the private sector are customers who lease equipment, service from telephone companies and transmission media facilities on a permanent basis. The leased circuits are configured and designed for their utilization only and are frequently referred to as dedicated line circuits or private line circuits. For illustration, large banks do not desire to share their communication network along with other users, but this is not effective for them to construct their own networks. Thus, facilities from public telephone companies, banks lease equipment and fundamentally operate a private telephone or data network inside the PSTN. The public telephones companies are for a moment called providers, like they lease equipment and give service to other private organizations, companies and government agencies. Both MANs and WANs (i.e. most metropolitan area networks and wide area networks) uses private line data circuits and one or more service provider. Subscribers to the public sector of the PSTN share equipment and facilities which are available to all the public subscribers to the network. Such equipment is appropriately termed as common usage equipment, that includes transmission facilities and telephone switches. Everyone with a telephone number is a subscriber to the public sector of the PSTN. Because subscribers to the public network are interconnected only temporarily by switches, the network is frequently appropriately called the public switched telephone network (PSTN) and occasionally simply as the dial-up network. This  is possible to interconnect telephones and modems along with one another over huge distance in fraction of a second by means of an elaborate network contains of central offices, cables (as optical and metallic), switches and wireless radio systems which are connected through routing nodes here a node is a switching point. When someone talks regarding the public switched telephone network, they referring to the combination of lines and switches which from a system of electrical routes by the network.


Related Discussions:- Explain public switched telephone network

Explain the test instruction, Explain the TEST instruction TEST instru...

Explain the TEST instruction TEST instruction performs the AND operation. The difference is that AND instruction changes the destination operand whereas TEST instruction doesn

Explain the types of computer architecture, Explain the types of computer a...

Explain the types of computer architecture Computer architecture can be divided into three main categories: Instruction Set Architecture, or ISA, is the image of a computing

In order to concatenate strings only for output purposes, In order to conca...

In order to concatenate strings only for output purposes which command can be used in conjunction with the 'Write' statement. NO-GAP command.

Illustrate the multiplication algorithms, Multiplication Algorithms Mul...

Multiplication Algorithms Multiplication of the two fixed-point binary numbers in signed magnitude representation is done with paper and pencil through a process of successive

Does xml replace html, No XML does not replace HTML. Instead, it gives an a...

No XML does not replace HTML. Instead, it gives an alternative which permits you to explain your own set of markup elements. HTML is expected to stay in common use for some time to

Parallel virtual machine, Parallel Virtual Machine (PVM): PVM (Parallel...

Parallel Virtual Machine (PVM): PVM (Parallel Virtual Machine) is portable message passing programming system which is designed to link different heterogeneous host machines to

How many bits are required for a ladder d/a converter, How many bits are re...

How many bits are required at the input of a ladder D/A converter, if it is required to give a resolution of 5mV and if the full scale output is +5V. Find the %age resolution.

Binary, 8:1 Mux for a given function, f=S (0, 1,5,7,9, 13)..

8:1 Mux for a given function, f=S (0, 1,5,7,9, 13)..

Password cracking, Hashed strings can often be deciphered by 'brute forcing...

Hashed strings can often be deciphered by 'brute forcing'. Bad news, eh? Yes, and particularly if your encrypted passwords/usernames are floating around in an unprotected file some

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd