Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the CCITT hierarchical structure of switching using block schematic.
Hierarchical network are able of handing heavy traffic where needed, and at similar time use minimal number of trunk groups. The 5-level switching hierarchy is recommended through CCITT as shown in figure. Traffic from subscriber A to subscriber B and vice-versa flows by the highest level of hierarchy, in a strictly hierarchical network and namely as Quaternary centres in figure. A traffic route through the highest level of hierarchy is termed as the final route. Though, if there is high traffic intensity among any pair of exchanges, direct trunk groups may be established among them as demonstrated by dashed lines in figure. These direct routes are termed as high usage routes. Wherever high usage routes exist, the traffic is primarily routed through them. Overflow traffic, if any, is routed along the hierarchical path. No overflow is permitted from the final route. In figure the first option routing for traffic between subscribers A and B is via the high usage route across the primary centres. The second and the third choice route and the last route are also indicated in figure. A hierarchical system of routing leads to basic switch design. Three methods are usually used for deciding on the route for an exact connection:
1. Right-through routing.
2. Own-exchange routing.
3. Computer-controlled routing.
(c) CCITT hierarchical structure
Explain the E-cheques verses Credit Cards in brief. E-cheques: E-cheques are utilized for business dealing into e-commerce. Transactions of such cheques take place onto Inter
Shadow RAM is a copy of Basic Input/Output Operating System (BIOS) routines from read-only memory (ROM) into a particular area of random access memory (RAM) so that they can be acc
Stack pointer is a particular purpose 16-bit register in the Microprocessor, which grasp the address of the top of the stack.
Instruction Issue degree : The major concept in superscalar processing is how many instructions we can issue per cycle. If we issue k number of instructions per cycle in a supersca
Period and Space Tradeoffs - artificial intelligence: In practice, you are going to stop your agent for long term using in searching goal at some stage if it has not found a s
Video Conferencing Video conferencing continues to grow in popularity. Why is this? Some reasons are listed below: - Communication links are now much faster thus sound quali
What are the Main aspects available in all word processors - Ability to set page size and page orientation - Ability to change font size and font style (for example Arial,
What courses draught in a simple pendulum experiment
Problem : (a) Show whether or not a standard format for representing data, such as XML, is needed. (b) Using an appropriate example, describe how data is organized in a dat
Assignment 4: Handwritten Bangla Numeral Recognition using Multilayer Feed Forward Neural Network. In this assignment, you will design a multi layer feed forward neural network
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd