Integrated services digital network service, Computer Networking

Assignment Help:

The entire idea of ISDN is to digitize the telephone network to allow the transmission of video, audio and text over existing telephone lines. The reason of the ISDN is to provide fully integrated digital services to users.

For accessing the Internet the use of ISDN has breathed new life into ISDN service. ISDN's slow acceptance owed mostly to a lack of need for its capabilities.  Being a digital interface, ISDN has provided a means for accessing web sites rapidly & efficiently. In response to this new demand, telephone companies are adding ISDN services rapidly.

The ISDN standard described three channels types, each with the distinct transmission rate: data channel (D), bearer channel (B) and hybrid channel (H)

Channel

Data Rate (Kbps)

B

64

D

16, 64

H

384, 1536, 1920

The B channel is described at a rate of 64 Kbps. It is the basic user channel & can carry any type of digital information in full duplex mode as long as the needed transmission does not exceed 64 kbps. A data channel can be either 64 or 16 kbps based on the needs of the user used to carry control signals for B channels.

Of the two basic rate B channels, one is utilized to upload data to the Internet & one to download from the Internet.  The D Channel assists into setting connection & maintaining flow control. There are three ways ISDN can be utilized to interface to the Internet, by using adaptor, modem or bridge/router. ISDN modems & adaptors limit access to a single user. Both terminate the line in an ISDN service. The difference among them is that the ISDN modem takes the Internet traffic and pushes it by the computer serial port, whereas, the faster ISDN adaptor connects to the computer's buses directly.

ISDN bridge/routers let for local network connections to be made through ISDN to the Internet. The ISDN termination is built into an Ethernet-type LAN so that multiple users can attain access to the Net through a single access address. Transfer rates among user and the Internet are between 56 and 128 Kbps.


Related Discussions:- Integrated services digital network service

Show the data encryption standard, Q. Show the Data Encryption Standard? ...

Q. Show the Data Encryption Standard? Data Encryption Standard - Bit-level encryption method designed by IBM - Adopted as standard for nonmilitary and nonclassified us

Explain the meaning and use of the z-index property in dhtml, QUESTION ...

QUESTION (a) In CSS, each element in a document is considered to be in an invisible box. Give three ways how to make the box visible (b) (i) Explain the meaning and use of t

Explain 10base-T- twisted pair ethernet, 10Base-T: Twisted Pair Ethernet ...

10Base-T: Twisted Pair Ethernet Most popular standard simplest to install and reconfigure Star topology LAN utilize UTP cable no need for AUI It supports data rag

Why it is necessary to have layering in a network, Why it is necessary to h...

Why it is necessary to have layering in a network? A computer network is a very complex system. It becomes very difficult to execute as a single entity. The layered approach di

What command do we use to disable domain lookup, no ip domain-lookupcommand...

no ip domain-lookupcommand is use to disable domain lookup

Determine the concept of placing antenna on hieght, Determine the concept o...

Determine the concept of placing antenna on hieght First, starting deployment simply placed cells in regions where there was high density of vehicle or human population. Once t

Networking & computer architecture long question, Write discussion on Assoc...

Write discussion on Associative mapping - computer architecture.

Define the bulletin board intranet, Define the Bulletin Board Intranet ...

Define the Bulletin Board Intranet This type of Intranet in an organisation extends to everyone the capability to review or update information that would normally be placed

Public key cryptography and private key cryptography, Question: a) Di...

Question: a) Differentiate between the following key terms used in any e-banking security system: (i) Authorisation v/s Authentication. (ii) Data Integrity v/s Data Conf

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd