What are concentrators, Computer Engineering

Assignment Help:

What are concentrators? Explain how it helps in connecting number of subscribers.

In rural areas, subscribers are usually dispersed. This is both unessential and expensive to give a dedicated pair for each subscriber. Three techniques are utilized to gain on the number pairs are as following:

1. Parity lines

2. Concentrators

3. Carrier Systems.

In second technique, a concentrator expander (CE) is utilized near the cluster of users and other one at the exchange end as demonstrated in figure.

2370_Concentrator-expander connection for dispersed subscribers.png

FIG - Concentrator-expander connection for dispersed subscribers.


Related Discussions:- What are concentrators

Types of validation controls provided by asp.net, Types of validation contr...

Types of validation controls provided by ASP.Net There are following types of validation controls provided by ASP.Net: 1. Required Field Validator 2. Compare Validator

What layers are covered under end to end layer connectivity, What layers ar...

What layers are covered under end to end layer connectivity? The layers 4 to 7 of ISO-OSI reference model communicate along with peer entities into the end systems. There is n

Explain about truth table and logic diagram, Q. Explain about truth table a...

Q. Explain about truth table and logic diagram? A Boolean function can be realized in a logic circuit employing the basic gates: - AND, OR & NOT. Concern here for illustration

Define memory cell, Define memory cell? A memory cell is capable of sto...

Define memory cell? A memory cell is capable of storing single bit of information. It is usually organized in the form of an array

Explain one dimensional array, Explain one dimensional arrays In one di...

Explain one dimensional arrays In one dimensional arrays array name is really a pointer to the first element in the array. Second element of the array can be accessed by using

Delete command, When the user is inputting commands into your shell, it sho...

When the user is inputting commands into your shell, it should properly handle delete and backspace. When one of these characters is detected, you will need to remove one character

What are the attributes of the method, What are the attributes of the metho...

What are the attributes of the method? During implementation a process is characterized by various attributes maintain by the system: Its state Its identification

Table - tr and td tags, Table, TR and TD Tags Three tags form the essen...

Table, TR and TD Tags Three tags form the essential ingredients for creating a table. TABLE: This is the main tag. It tells the browser that a table follows. It has attrib

Path & Path Production, Take the following flow graph and use the procedure...

Take the following flow graph and use the procedure in chapter 8 to derive an equivalent regular expression. Show all intermediate graphs (to ensure that you follow the procedure,

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd