Explain what is dtmf signalling, Computer Engineering

Assignment Help:

Explain what is DTMF signalling.

Dual Tone Multi Frequency (DTMF) was initially introduced in 1963 with 10 buttons into Western Electric 1500 -type telephones. Dual Tone Multi Frequency was originally termed as Touch- Tone. It is a more efficient means than dial pulsing for transferring telephone numbers by a subscriber's location to central office switching the machine. It is an easy two-of-eight encoding scheme, here each digit is represented through the linear addition of two frequencies. This is strictly for signaling among a subscriber's location and message switching center or the nearest telephone office. Dual Tone Multi Frequency is sometimes confused along with other two-tone signaling system termed as multi frequency signaling (Mf) that is a two-of-six code designed to be utilized only to convey information among two electronic switching machines.

Figure demonstrates the four-row-by-four column keypad matrix used along with a DTMF keypad. As in the figure demonstrates, the keypad is comprised of 16 keys and eight frequencies. However, mainly household telephones are not equipped along with the special-purpose keys located into the fourth column (that is the A, B, C and D keys). Hence, most household telephones in fact use two-of-seven tone encoding scheme. The four vertical frequencies which are termed as the low group frequencies are 697 Hz, 852 Hz and 941 Hz and the 4-horizontal frequencies which are termed as the high group frequencies are 1209 Hz, 1336 Hz, 1477 Hz and 1633 Hz. The frequency tolerance of the oscillators is + .5 percent. As demonstrated in figure, the digits 2 by 9 can also be used to show 24 of the 26 letters (as Q and Z are omitted). These letters were originally used to specify one local telephone exchange from other.

255_DTMF Keypad Layout.png

Figure: DTMF Keypad Layout


Related Discussions:- Explain what is dtmf signalling

Parallel computer architecture , Parallel Computer Architecture Intr...

Parallel Computer Architecture Introduction We have talked about the classification of parallel computers and their interconnection networks in that order in units 2 and

Registers used in IA-64 architecture, Q. Registers used in IA-64 architectu...

Q. Registers used in IA-64 architecture ? Registers: The IA-64 architecture comprises a very generous set of registers. It has an 82-bit floating point as well as 64-bit inte

The extra key inserted at the end of the array, The extra key inserted at t...

The extra key inserted at the end of the array is called a Sentinel is the extra key inserted at the end of the array

What is shared memory programming, Q. What is Shared Memory Programming? ...

Q. What is Shared Memory Programming? We know all processors share a common memory in shared memory model. Every processor can be assigned a separate portion of program stored

Explain difference between risc and cisc, RISC-Means Reduced Instruction Se...

RISC-Means Reduced Instruction Set Computer. A RISC system has decreased number of instructions and more significantly it is load store architecture were pipelining can be executed

Should validation occur server- side or client - side, Should validation (d...

Should validation (did the user enter a real date) occur server-side or client-side? Why? Validation will be completed in both sides i.e., at the server side and client side. S

What is user defined functions, What is User Defined Functions? User-De...

What is User Defined Functions? User-Defined Functions permit defining its own T-SQL functions that can accept 0 or more parameters and return a single scalar data value or a t

Automated reasoning - first-order logic, Automated Reasoning - first-order ...

Automated Reasoning - first-order logic: The topic known as "Automated Reasoning" in "AI"concentrates mostly on deductive reasoning, here new facts are logically deduced from

Two ways for restricting the value range for a domain, What are the two way...

What are the two ways for restricting the value range for a domain? By specifying fixed values. By stipulating a value table.

By which exposing EPROM contents can be erased, EPROM contents can be eras...

EPROM contents can be erased by exposing it to ? Ans. By exposing EPROM contents to Ultraviolet rays, it can be erased. The Ultraviolet (UV) light passes throughout a window i

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd