Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Discuss in detail the subscriber loop systems.
Subscriber Loop System: Every subscriber in a telephone network is linked usually to the nearest switching office by means of wire's dedicated pair. Subscriber loop seems as to this pair of wires. This is unwidely to run physically independent pairs from each subscriber premises to the exchange. This is far easier to lay cables having a number of pairs of wires for various geographical locations and run single pairs as needed by the subscriber premises.
FIG - Cable Hierarchy For Subscriber Loops.
MDF = main distribution frame; MF = main feeder; FP = feeder point; BF = branch feeder; DW = drop wires; DP = distribution point; DC = distribution cable
Usually four levels of cabling are used as demonstrated in figure. At the subscriber ending, the drop wires are obtained to a distribution point. The drop wires are the single pairs which run into the subscriber premises. The drop wires are associated to wire pairs in the distribution cables, at the distribution point. Several distribution cables from nearby geographical locations are terminated on a feeder point where they are linked to branch feeder cables that, in turn, are linked to the main feeder cable. This main feeder cables carry a larger number of wire pairs, classically 100 to 2000, than the distribution cables that carry typically 10-500 pairs. These feeder cables are terminated on a main distribution frame (MDF) at the exchange. The subscriber cable pairs emanating by the exchange are also terminated at the MDF.
different locking techniques
E-mail system is mostly used for sending message electronically to group or individuals of individuals in inter and intra office environment. It needs networks to connect them. In
In a 10000 line exchange, 0000 to 2999 is allotted to x group of subscribers, out of which 40% are active during busy hour. The remaining numbers are domestic numbers out of which
Advantages and Disadvantages of Public-key cryptography Advantages (i) Enhanced security and convenience (ii) Electronic records may be authenticated by affixing
How AI think rationally& acting rationally
Question: (a) Comment on the general structure of the IAS Computer, illustrate your answer using a diagram. (b) (i) Define CPU time. (a) (ii) A program runs in 10
The following is taken from the first edition of the Set Book. We have included this because we find these characteristics helpful. We will refer to them later. In addition to t
Q. Explain the Use of functions in parallel programming? include "pvm3.h" main() { int cc, tid, msgtag; char buf[100]; printf("%x\n", pvm_mytid());
Design a BCD to excess 3 code converter using minimum number of NAND gates. Hint: use k map techniques. Ans. Firstly we make the truth table: BCD no
Explain about the Microsoft and the Netscape With the increasing competition between certain vendors especially the Microsoft and the Netscape, there have been a number of chan
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd