Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the CCITT hierarchical structure of switching using block schematic.
Hierarchical network are able of handing heavy traffic where needed, and at similar time use minimal number of trunk groups. The 5-level switching hierarchy is recommended through CCITT as shown in figure. Traffic from subscriber A to subscriber B and vice-versa flows by the highest level of hierarchy, in a strictly hierarchical network and namely as Quaternary centres in figure. A traffic route through the highest level of hierarchy is termed as the final route. Though, if there is high traffic intensity among any pair of exchanges, direct trunk groups may be established among them as demonstrated by dashed lines in figure. These direct routes are termed as high usage routes. Wherever high usage routes exist, the traffic is primarily routed through them. Overflow traffic, if any, is routed along the hierarchical path. No overflow is permitted from the final route. In figure the first option routing for traffic between subscribers A and B is via the high usage route across the primary centres. The second and the third choice route and the last route are also indicated in figure. A hierarchical system of routing leads to basic switch design. Three methods are usually used for deciding on the route for an exact connection:
1. Right-through routing.
2. Own-exchange routing.
3. Computer-controlled routing.
(c) CCITT hierarchical structure
Explain the term- Variables - Variables are used for local storage of data - Variables are usually not available to multiple processes and components. - Variables would
Signalling transfer point (STP) exist in (A) Strowger exchange (B) SS7 (C) Local area network (D) PABX Ans: STP that is stand f
1. Create the following ADTs. (a) Write the constructor function makestk, predicate function emptystk and mutator functions pushstk and popstk: i. makestk returns a new stack
Distributivity of Connectives : In our last analogy with arithmetic will involve a very well-technique need for playing around with algebraic properties. But assume there if w
I have converted my MS Access database to a present conversion. I am getting conversion errors? Ans) Design specs have changed in new releases of MS Access. Visit the on-line
a. Define the meaning of "Document & Finger print" and "Message & Message Digest". What's the difference among the 2 pairs? b. Describe Davies Meyer scheme with diagram. c. W
Final Implementation of Object oriented modelling Final Implementation: At this phase, the final execution of classes and relationships developed while object design takes
The LOOP-ENDLOOP on extract datasets can be used without any kind of errors False. It causes runtime errors.
State the term- Use a define function This is almost exactly the same approach as #define and -D compiler arg that C programs use. In your Verilog code, use a 'define to
Implement the following function using 8 to 1 multiplexer Y(A, B, C, D) = ∑(0,1,2,5,9,11,13,15) Ans. We will obtain three variables B,C and D at selection lines and also A as i
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd