Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Discuss in detail the subscriber loop systems.
Subscriber Loop System: Every subscriber in a telephone network is linked usually to the nearest switching office by means of wire's dedicated pair. Subscriber loop seems as to this pair of wires. This is unwidely to run physically independent pairs from each subscriber premises to the exchange. This is far easier to lay cables having a number of pairs of wires for various geographical locations and run single pairs as needed by the subscriber premises.
FIG - Cable Hierarchy For Subscriber Loops.
MDF = main distribution frame; MF = main feeder; FP = feeder point; BF = branch feeder; DW = drop wires; DP = distribution point; DC = distribution cable
Usually four levels of cabling are used as demonstrated in figure. At the subscriber ending, the drop wires are obtained to a distribution point. The drop wires are the single pairs which run into the subscriber premises. The drop wires are associated to wire pairs in the distribution cables, at the distribution point. Several distribution cables from nearby geographical locations are terminated on a feeder point where they are linked to branch feeder cables that, in turn, are linked to the main feeder cable. This main feeder cables carry a larger number of wire pairs, classically 100 to 2000, than the distribution cables that carry typically 10-500 pairs. These feeder cables are terminated on a main distribution frame (MDF) at the exchange. The subscriber cable pairs emanating by the exchange are also terminated at the MDF.
How many select lines will a 16 to 1 multiplexer will have ? Ans. For 16 to 1 MUX four select lines will be needed to select 16 (2 4 ) inputs.
What is major difference between the Historic Unix and the new BSD release of Unix System V in terms of Memory Management? Historic Unix uses Swapping - Whole process is tran
Mating: Therefore once our GA agent has chosen the individuals lucky sufficient as actually there fit enough to produce offspring then we next determine how they are going to
Soundness - artificial intelligence: You may see in some application domains-for example automated theorem proving - that your search is "sound and complete". The soundness in
Within micro controller's software, it is very useful to be able to manipulate binary bits i.e. from ports etc. The ALU has command to shift data, rotate data, compare data, set/cl
Artificial intelligence language processing (AILP) is a field of computer science and linguistics concerned with the interactions among computers and human (natural) languages; it
Define seek time and latency time. The time taken by the head to move to the appropriate cylinder or track is known as seek time. Once the head is at right track, it must wai
Higher Order Predicate Logic : In the very first order predicate logic, we are only allowed to quantify over objects. If we are considered to allow ourselves to quantify over
Explain the Biometric Systems in brief. Biometrics: It is the science of measuring physical properties of living beings. Biometric Authentication: (a) This authenticati
Hubs are present in the network To interconnect the LAN with WANs.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd