Find the width of a time division space switch, Computer Engineering

In a time division space switch the size of the control memory is N and its Width:

 (A) Log10M

 (B) LogeM

 (C) LogNM

 (D) Log2M

Where N are the outlets and M the number of data samples


 This must 2 log2[N] in a time division space switch.

Posted Date: 5/16/2013 8:23:22 AM | Location : United States

Related Discussions:- Find the width of a time division space switch, Assignment Help, Ask Question on Find the width of a time division space switch, Get Answer, Expert's Help, Find the width of a time division space switch Discussions

Write discussion on Find the width of a time division space switch
Your posts are moderated
Related Questions
design modulo 12 up synchronous counter using t flip flop

Difference between an interpreted language and a compiled language? Ans) A compiled language is written and then run by a compiler which checks its syntax and compresses it int

Q. Explain Bus Interface Unit? BIU (Bus Interface Unit) mainly interacts with system bus. It executes nearly all the activities relating to fetch cycle like:  Computing

Multiple Instruction and Single Data stream (MISD) In this association, multiple processing elements are structured under the control of multiple control units. Each control un

Define Top-down parsing Techniques Top-down parsing can be observed as an attempt to find left-most derivations of an input-stream through searching for parse trees using a top

A computer system with 16K of memory, a Memory Management Unit with a page size of 2000, and the following page translation table :      Logical Address    Physical Start 0000

Q. Illustrate benefits of register addressing mode? The key benefits of register addressing are: Register access is faster than memory access and henceforth register add

Q. Benefit of digital versatile disk read only memory? The main benefit of having CAV is that individual blocks of data can be accessed at semi-random mode. So head can be move

Public Key Infrastructure solutions The use of public-key based security systems requires great attention and due care in design and management of security features. The secur

Q. Convert the following into POS form 1.  (AB + C + DC)(AB + BC + D) 2.  WYZ + XYZ + W'X'Y + W'XYZ 3.  XY + XZ + X'YZ' 4.   (A+B'+C) (AB+AC') 5.   F(A,B,C,D)=M(0,3,