Explain 100 line exchange with two-motion line finders, Computer Engineering

Assignment Help:

Explain 100 line exchange with two-motion line finders.

Design: In such design, here are 24 line finders. When any of the 100 subscribers has to find access to any of the 24 two-motion selectors, this is necessary that every line finder is able of reaching any of the 100 subscribers. Conversely, each line finder should have 100 outlets. For this purpose, two motion selectors have to be used as line finders. The configuration is demonstrated in figure. The corresponding outlets of the line finders are commoned. Likewise, the outlets of the numerical selectors are commoned also.

While the start condition is received, line finder is caused to hunt vertically till the wipers reach a marked level. The vertical hunting is after that stopped and the horizontal hunt commences to get a particular marked contact in this level. This may be noted that into the extreme case, the line finder need take 20-steps -10 vertical and 10 horizontal -before a line is determined. The line finders are made to step automatically, by using interrupter contact mechanism. If the line finder locates the subscriber line, start condition is removed, the allotter switch steps on to the subsequent free line finder in readiness for additional calls, and the numerical selector sends out the dial tone to the subscriber in readiness to get dialing pulses. After that the establishment of the connection proceeds in the usual way.

Evidently, Design 3 is by far the best for a 100-line exchange. When we had used uni selectors as line finders, this would have been essential to divide subscriber's line in small groups of, as 24 each. These designs involving groupings, function efficiently only in certain specific traffic conditions and usually lead to higher blocking probabilities.

2020_Line exchange with two-motion line finders.png

FIG - 100-Line exchange with two-motion line finders


Related Discussions:- Explain 100 line exchange with two-motion line finders

Explain the type of micro-operations, Q. Explain the type of micro-operatio...

Q. Explain the type of micro-operations? Let's first discuss type of micro-operations. Most common micro-operations performed in a digital computer can be categorized into 4 ca

What is virtual memory, What is virtual memory? Method that automatical...

What is virtual memory? Method that automatically move program and datablocks into the physical main memory when they are needed for execution are known as virtual memory.

Autonomous rational an agents, Autonomous Rational an Agents: In many ...

Autonomous Rational an Agents: In many cases, it is inaccurate to talk about a single program or a single robot, as the multi-purpose and multi-tasking system of hardware and

Sequential execution of instructions in risc, Q. Sequential Execution of In...

Q. Sequential Execution of Instructions in RISC? Let's describe pipelining in RISC with an illustration program execution sample. Take the given program (R denotes register).

Show the memory hierarchy of computer system, Q. Show the Memory Hierarchy ...

Q. Show the Memory Hierarchy of computer system ? Memory in a computer system is essential for storage and subsequent retrieval of instructions and data. A computer system uses

What is logical address space and physical address space, What is logical a...

What is logical address space and physical address space? The set of all logical addresses generated by a program is known as a logical address space; the set of all physical a

Scsi bus - computer architecture, SCSI Bus:   Defined by ANSI - X3....

SCSI Bus:   Defined by ANSI - X3.131   50, 68 or 80 pins   Max. transfer rate - 160 MB/s, 320 MB/s. SCSI Bus Signals   Small Computer System Interface

Difference between char a[] = "string", What is the difference between char...

What is the difference between char a[] = "string"; and char *p = "string";? Ans) In the first case 6 bytes are assigned to the variable a which is fixed, where as in the secon

What is the efficient data structure used in rdbms, In RDBMS, what is the e...

In RDBMS, what is the efficient data structure used in the internal storage representation? B+ tree. Because in B+ tree, all the data is kept only in leaf nodes, that makes sea

Operation research, how to implement a modified distribution method using c...

how to implement a modified distribution method using c/c++

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd