Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the CCITT hierarchical structure of switching using block schematic.
Hierarchical network are able of handing heavy traffic where needed, and at similar time use minimal number of trunk groups. The 5-level switching hierarchy is recommended through CCITT as shown in figure. Traffic from subscriber A to subscriber B and vice-versa flows by the highest level of hierarchy, in a strictly hierarchical network and namely as Quaternary centres in figure. A traffic route through the highest level of hierarchy is termed as the final route. Though, if there is high traffic intensity among any pair of exchanges, direct trunk groups may be established among them as demonstrated by dashed lines in figure. These direct routes are termed as high usage routes. Wherever high usage routes exist, the traffic is primarily routed through them. Overflow traffic, if any, is routed along the hierarchical path. No overflow is permitted from the final route. In figure the first option routing for traffic between subscribers A and B is via the high usage route across the primary centres. The second and the third choice route and the last route are also indicated in figure. A hierarchical system of routing leads to basic switch design. Three methods are usually used for deciding on the route for an exact connection:
1. Right-through routing.
2. Own-exchange routing.
3. Computer-controlled routing.
(c) CCITT hierarchical structure
Explain Busy tone in strowger telephony. Busy tone pattern is demonstrated in figure. This is a bursty 400 Hz signal with silence era in between. The burst and silence durati
Q. Describe types of complements? There are two kinds of complements for a number of base (also known as radix) r. These are known as r's complement and (r- 1)'s complement. Fo
Remote Login A login that permits a user terminal to connect to a host computer by a network or direct telecommunications link, and to interact with that host computer as if t
What is the File-system security Most commercial servers use a powerful operating system as base that provides good methods of file-system security. Some servers require additi
List one advantage and one disadvantage of having large block size. Ans: Advantage: By using a huge block of memory is maximum process's accommodation that resulting is less no
Q. Write Policy of cache memory? If contents of a block in cache are changed then it's essential to write it back to main memory before replacing it. Write policy determines wh
Define memory cycle time? It is the time delay needed between the initiations of two successive memory operations. Eg. The time among two successive read operations.
What are the Barcode readers These collect data from printed barcodes and allow automatic stock control in, for illustration, supermarkets.
How a Java program compiles? First source file name should be extended with .java extension. For example Myprog.java Execute javac compiler. javac compiler creates
1) Short both I/Ps of NAND gate & use the gate as an inverter. 2) Connect any one of the two I/Ps to VCC & use the remaining I/P & use the gate as an inverter.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd