Integrated services digital network service, Computer Engineering

Assignment Help:

Whole idea of ISDN is to digitize the telephone network to permit transmission of video, audio and text over existing telephone lines. The purpose of ISDN is to provide fully integrated digital services to users.

Use of ISDN for accessing the Internet has breathed new life into ISDN service. ISDN's slow acceptance was due mostly to a lack of a need for its capabilities. Being a digital interface, ISDN has provided a means for accessing web sites efficiently and quickly. In response to this new demand, telephone companies are speedily adding ISDN services.

ISDN standard defines three channels types, each with different transmission rate: bearer channel (B), data channel (D) and hybrid channel (H) (see the below table)

Channel 

Data Rate (Kbps)

64

D

16, 64

H

384, 1536, 1920

B channel is defined at a rate of 64 Kbps. It is the fundamental user channel and can carry any type of digital information in full duplex mode as long as required transmission doesn't exceed 64 kbps. A data channel can be either 16 or 64 kbps depending on the needs of user used to carry control signals for B channels.

Of two basic rate B channels, one is used to upload data to Internet and one to download from the Internet. D Channel helps in setting up connection and sustaining flow control. There are 3 ways ISDN can be used to interface to Internet, by employing an adaptor, modem or bridge/router. ISDN adaptors and modems limit access to a single user. Both terminate line into an ISDN service. Main difference between them is that ISDN modem takes Internet traffic and pushes it through computer serial port, whereas , faster ISDN adaptor connects directly to computer's buses.

ISDN routers/bridge allow for local network connections to be made by ISDN to Internet. ISDN termination is made into an Ethernet-type LAN so that numerous users can achieve access to Net by a single access address. Transfer rates between user and Internet are between 56 and 128 Kbps.


Related Discussions:- Integrated services digital network service

Explain about quine mckluskey method, Q. Explain about Quine McKluskey Meth...

Q. Explain about Quine McKluskey Method? A tabular method was proposed to deal with increasing number of variables called Quine McKluskey Method. This method is appropriate for

What are the disadvantages of linux, What are the disadvantages of Linux? ...

What are the disadvantages of Linux? Learning Lack of comparable programs More technical skill required

What is meant by maskable interrupts, A interrupt that can be turned off by...

A interrupt that can be turned off by the programmer is called as Maskable interrupt.

Queueing process, explain in detail about queueing process

explain in detail about queueing process

Interaction design, This unit introduces the most important ID terminology,...

This unit introduces the most important ID terminology, explains why ID is important, and gives a description of the main ID activities and the characteristics of the ID process. I

Define external variable declaration, Summarize the distinction between an ...

Summarize the distinction between an external variable definition and an external variable declaration. When we have ''declared'' a variable, we have meant that we have told th

Assembly language programming, write an assembly language program for fibon...

write an assembly language program for fibonacci series?

How are the instructions provided to computer, Let's answer our second ques...

Let's answer our second question first. All computers have a Unit which performs arithmetic and logical functions. This Unit is called as Arithmetic and Logic Unit (ALU). However h

How many lines of address bus used for memory of 2048 bytes, How many lines...

How many lines of address bus must be used to access 2048 bytes of memory when available RAM chips 128 × 8.  How many lines of these will be common to each chip? Ans. AS chips

.image forgery detection, what is the code to detect image forgery using Ma...

what is the code to detect image forgery using Matlab..??

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd