Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the CCITT hierarchical structure of switching using block schematic.
Hierarchical network are able of handing heavy traffic where needed, and at similar time use minimal number of trunk groups. The 5-level switching hierarchy is recommended through CCITT as shown in figure. Traffic from subscriber A to subscriber B and vice-versa flows by the highest level of hierarchy, in a strictly hierarchical network and namely as Quaternary centres in figure. A traffic route through the highest level of hierarchy is termed as the final route. Though, if there is high traffic intensity among any pair of exchanges, direct trunk groups may be established among them as demonstrated by dashed lines in figure. These direct routes are termed as high usage routes. Wherever high usage routes exist, the traffic is primarily routed through them. Overflow traffic, if any, is routed along the hierarchical path. No overflow is permitted from the final route. In figure the first option routing for traffic between subscribers A and B is via the high usage route across the primary centres. The second and the third choice route and the last route are also indicated in figure. A hierarchical system of routing leads to basic switch design. Three methods are usually used for deciding on the route for an exact connection:
1. Right-through routing.
2. Own-exchange routing.
3. Computer-controlled routing.
(c) CCITT hierarchical structure
Q. Describe about Remote-load Latency Problem? When one processor requires some remote loading of data from other nodes then processor has to wait for these two remote load ope
How do you achieve workflow automation in e-business environment? In order to run easily, organizations often standardize processes across the organization and encourage user
Eliminating hazards of pipeline - computer architecture: We can delegate the work of eliminating data dependencies to the compiler, which can fill up in suitable number of NO
What is an encoder? Draw the logic circuit of Decimal to BCD encoder and explain its working. Ans. Encoder: It is a combinational logic circuit which converts alphanumeric ch
Mr. Franco Forest owns a small lawn care business with three employees. He owns the lawn mowers, rakes, and weed whackers that are housed in a storage area at the back of his home.
Whenever a developer is signing into the code project you will have three options they are disable the macro, enable the macro and explicitly trusting the publisher. You can trust
What is graceful degradation? In multiprocessor systems, failure of one processor will not halt the system, but only slow it down by sharing the work of failure system by other
State about the Internet services Internet services are provided automatically, in many other implementations the certificate is stored on a separate database or token such as
Q. Starting parallel virtual machine? To initialize PVM on any host on that PVM has been installed we can type % pvm The PVM console known as pvm is a standalone PVM t
What are the advantages and disadvantages of a Smart Card? Advantages of Smart Card: 1. It gives convenience & support for multiple currencies over borders. 2. Used
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd