Explain isdn addressing with a example, Computer Engineering

Assignment Help:

Explain ISDN Addressing with a example.

A sub address, though a part of the ISDN address, is not seems as an integral part of the numbering scheme. Sub-address is carried in a separate field into the user-network interface message. This may or may not be present in a call setup message. The sub address is usually transparent to the network and this equipment at the destination that analyses the sub address information for routing to the appropriate terminal. A usual address using both ISDN number and the sub address is demonstrated in figure. Now, an ISDN number identifies a T reference point and a sub address one of several S reference points. Otherwise, as reference point may also be addressed through using direct inward dialing (DID) feature.

1891_Example of ISDN Addressing.png

Fig - Example of ISDN Addressing


Related Discussions:- Explain isdn addressing with a example

Find out the correction to be applied in decimal adder, The correction to b...

The correction to be applied in decimal adder to the generated sum is ? Ans. 00110 is the generated sum when the correction to be applied in decimal adder. While the 4 bit su

Determine the purpose of GDTR, Elucidate the purpose of GDTR. If the microp...

Elucidate the purpose of GDTR. If the microprocessor sends linear address 00200000H to paging mechanism, which paging directory entry and which page table entry is accessed? GD

Analysts in computer operations, Q. Analysts in Computer Operations? Co...

Q. Analysts in Computer Operations? Computer Operations: All of the shared computers comprising mainframes, minicomputers and other computers are put to operation and same is c

Cn, What is the basic requirement for establishing VLANs?

What is the basic requirement for establishing VLANs?

Cisc approach - cisc architecture, CISC Approach - CISC architecture: ...

CISC Approach - CISC architecture: The main goal of CISC architecture is to finish a task in as few lines of assembly as possible as. This is gain by building processor hardwa

What is software quality assuranc, Software QA includes the whole software ...

Software QA includes the whole software development PROCESS - improving and monitoring the process, making sure that any agreed-upon standards and processes are followed, and ensur

Explain vector-vector instructions, Vector-Vector Instructions In this...

Vector-Vector Instructions In this category, vector operands are fetched from vector register and accumulated in another vector register. These instructions are indicated with

A sorting algorithm is stable, A sorting algorithm is stable if  Preser...

A sorting algorithm is stable if  Preserves the original order of records with equivalent keys.

Disadvantages of unauthenticated sites, Disadvantages of unauthenticated si...

Disadvantages of unauthenticated sites All the Units entering the Intranet must be scrutinised to ensure that they are not coming from the unauthenticated sites or users. It a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd