Integrated services digital network service, Computer Engineering

Assignment Help:

Whole idea of ISDN is to digitize the telephone network to permit transmission of video, audio and text over existing telephone lines. The purpose of ISDN is to provide fully integrated digital services to users.

Use of ISDN for accessing the Internet has breathed new life into ISDN service. ISDN's slow acceptance was due mostly to a lack of a need for its capabilities. Being a digital interface, ISDN has provided a means for accessing web sites efficiently and quickly. In response to this new demand, telephone companies are speedily adding ISDN services.

ISDN standard defines three channels types, each with different transmission rate: bearer channel (B), data channel (D) and hybrid channel (H) (see the below table)

Channel 

Data Rate (Kbps)

64

D

16, 64

H

384, 1536, 1920

B channel is defined at a rate of 64 Kbps. It is the fundamental user channel and can carry any type of digital information in full duplex mode as long as required transmission doesn't exceed 64 kbps. A data channel can be either 16 or 64 kbps depending on the needs of user used to carry control signals for B channels.

Of two basic rate B channels, one is used to upload data to Internet and one to download from the Internet. D Channel helps in setting up connection and sustaining flow control. There are 3 ways ISDN can be used to interface to Internet, by employing an adaptor, modem or bridge/router. ISDN adaptors and modems limit access to a single user. Both terminate line into an ISDN service. Main difference between them is that ISDN modem takes Internet traffic and pushes it through computer serial port, whereas , faster ISDN adaptor connects directly to computer's buses.

ISDN routers/bridge allow for local network connections to be made by ISDN to Internet. ISDN termination is made into an Ethernet-type LAN so that numerous users can achieve access to Net by a single access address. Transfer rates between user and Internet are between 56 and 128 Kbps.


Related Discussions:- Integrated services digital network service

Fingerprint- biometric computer security systems, Fingerprint- Biometric co...

Fingerprint- Biometric computer security systems First of all, fingerprint is the most commonly used biometric technology, because every person has unique fingerprints and the

Example on public divisor, Q. Example on PUBLIC DIVISOR? Linker appends...

Q. Example on PUBLIC DIVISOR? Linker appends all segments having the same name and PUBLIC directive with segment name into one segment. Their contents are pulled together in co

Explain characteristics of latch and flip-flop, Explain characteristics of ...

Explain characteristics of Latch and Flip-Flop. Latches are level-sensitive and transparent While the clock is high it passes input value to Output While the clock is l

Computer Architecture, can u please tell me the assembly language program f...

can u please tell me the assembly language program for carry look ahead adder that can run in 8086 emulator?? its urgent

Linux, Explain about unix file system architecture

Explain about unix file system architecture

Explain the biometric systems and biometric authentication, Explain the Bio...

Explain the Biometric Systems in brief. Biometrics: It is the science of measuring physical properties of living beings. Biometric Authentication: (a) This authenticati

Why do we call motherboard a motherboard, Motherboard is called as motherbo...

Motherboard is called as motherboard because in the world all borned creature is directly attached to her mother & after it all the relations makes due to her mother so in the simi

What are program-invisible registers, What are program-invisible registers?...

What are program-invisible registers? Ans: the local and global descriptor tables are found in the memory system. To access and specify the address of these tables, program inv

Use string manipulating functions , Write a script that will first initiali...

Write a script that will first initialize a string variable that will kept x and y coordinates of a point in the form 'x 3.1 y 6.4'.  Then, use string manipulating functions to ext

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd