Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Discuss in detail the subscriber loop systems.
Subscriber Loop System: Every subscriber in a telephone network is linked usually to the nearest switching office by means of wire's dedicated pair. Subscriber loop seems as to this pair of wires. This is unwidely to run physically independent pairs from each subscriber premises to the exchange. This is far easier to lay cables having a number of pairs of wires for various geographical locations and run single pairs as needed by the subscriber premises.
FIG - Cable Hierarchy For Subscriber Loops.
MDF = main distribution frame; MF = main feeder; FP = feeder point; BF = branch feeder; DW = drop wires; DP = distribution point; DC = distribution cable
Usually four levels of cabling are used as demonstrated in figure. At the subscriber ending, the drop wires are obtained to a distribution point. The drop wires are the single pairs which run into the subscriber premises. The drop wires are associated to wire pairs in the distribution cables, at the distribution point. Several distribution cables from nearby geographical locations are terminated on a feeder point where they are linked to branch feeder cables that, in turn, are linked to the main feeder cable. This main feeder cables carry a larger number of wire pairs, classically 100 to 2000, than the distribution cables that carry typically 10-500 pairs. These feeder cables are terminated on a main distribution frame (MDF) at the exchange. The subscriber cable pairs emanating by the exchange are also terminated at the MDF.
A protocol is a formal description of message formats and the rules two or more machines must follow to exchange those messages. Because TCP (transmission control protocol) and IP
Write an algorithm for deadlock detection. An algorithm for deadlock detection: 1. Assume that Work and Finish be vectors of length m and n, correspondingly. Initialize:
why we say OS is a resource allocator and control program
Why IO devices cannot be directly be connected to the system bus? The IO devices cannot be directly linked to the system bus because i. The data transfer rate of IO device
How can i made Carnot engine
What is Repository Info. Systems? It is a tool with which you can create data stored in the ABAP/4 Dictionary available
What are the characteristics of SRAM? SRAM are fast They are volatile They are of high cost Less density
how to use a 1-16 demultiplexer as 4-16 decoder?
Put an "X" next to any of the following that are RISC CPU characteristics that show diffrence between RISC from CISC a) has limited addressing modes b) used in Motorola 6000 pro
What are privileged instructions? Some of the machine instructions that might cause harm to a system are designated as privileged instructions. The hardware permits the privil
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd