R-sat networks for pstn and stm v-sat network, Computer Networking

Assignment Help:

Std "B" 9 m C-BAND EARTH STATION (2001)

 

This  Earth  Station  is  aligned  with  INTEL  SAT  IOR  66°  and  provide domestic connectivity. R-Sat (Regional Satellite) is operating through this system in which five development regions of Nepal are connected via satellite as an alternate route. There are 9 carriers (6 stations) for PSTN switch and GSM and CDMA BTS back haul are in operation. Hub and Terminal both work on C-Band. STM V-Sat is also operated through this Earth Station. STM V-Sat can support 4 voice channels with one terminal, which are being used as a PCO for geographically isolated mountainous and difficult regions of Nepal. Remote terminal uses 2.4 m antenna.

Technical Specification

 

Frequency band                  : C Band

Antenna Size                      : 9 m

Polarization                         : Circular

Carrier Size                        : IDR (2 Mbps/ Carrier) Hub G/T  : 30.3 Deg/K

Remote G/T                        : 23.6 Deg/K (For 3.7 m Antenna)

Remote G/T                        : 25.5 deg/K (For 4.6 m Antenna) SSPA Size   : 400 Watts

 

 

 

2310_R-Sat Networks for PSTN.jpg

 

 

 

 

1907_STM V-SAT Network.jpg


Related Discussions:- R-sat networks for pstn and stm v-sat network

What are the bridges, Bridges - Operate in both physical and data link ...

Bridges - Operate in both physical and data link layers - Utilized to divide a network into smaller segments - May as well relay frames between separate LANs - Keeps t

Write the purpose of split horizon, Split Horizon - If you attain a protoc...

Split Horizon - If you attain a protocol's route on an interface, do not send information about that route back out that interface.

Mail message format - application layer, Mail Message  Format When an...

Mail Message  Format When an e mail  is sent from one person  to another  a header containing peripheral information precedes  the body  of the message itself. This contained

Timing in mpi program, MPI_Wtime ( ) returns elapsed wall-clock time in sec...

MPI_Wtime ( ) returns elapsed wall-clock time in seconds as some arbitrary point in past. Elapsed time for program segment is specified by the difference between MPI_Wtime values a

State synchronous FDDI, Synchronous Synchronous traffic is able to cons...

Synchronous Synchronous traffic is able to consume a portion of the 100 Mbps total bandwidth of an FDDI network while asynchronous traffic can consume the rest. Synchronous

Process of securing an intranet, Process of Securing an Intranet Secur...

Process of Securing an Intranet Securing an Intranet is not a simple task. Mere installation of firewall hardware and software would not help the Intranet to protect itself. P

What security risks present on the networks, Security risks present on the ...

Security risks present on the networks Lots of risks are present everywhere on Internet as well as on Intranet, if it is not known what is being done. Every day a number of

Describe the concept of successor and feasible successor, Describe the conc...

Describe the concept of successor and feasible successor?

Control flow in distributed enrollment protocol , Control Flow: Once the c...

Control Flow: Once the client has established a network connection with a server, the server must instantiate a new, empty, BasicEnrollmentManager implementation for this client,

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd