What are concentrators, Computer Engineering

Assignment Help:

What are concentrators? Explain how it helps in connecting number of subscribers.

In rural areas, subscribers are usually dispersed. This is both unessential and expensive to give a dedicated pair for each subscriber. Three techniques are utilized to gain on the number pairs are as following:

1. Parity lines

2. Concentrators

3. Carrier Systems.

In second technique, a concentrator expander (CE) is utilized near the cluster of users and other one at the exchange end as demonstrated in figure.

2370_Concentrator-expander connection for dispersed subscribers.png

FIG - Concentrator-expander connection for dispersed subscribers.


Related Discussions:- What are concentrators

Associative memory organisations, Associative Memory Organisations The ...

Associative Memory Organisations The associative memory is organised in w words with b bits per word. In w x b array, every bit is known a cell. Each cell is made up of a flip-

How to turn on the session support in php, The session support can be turne...

The session support can be turned on automatically at the site level, or manually in every PHP page script: * Turning on session support automatically at the site level: Set s

Can a structure be used within a structure, Can a structure be used within ...

Can a structure be used within a structure? Yes , a structure can be used within a structure known as nesting of structures.

Explain protection mechanism, Explain Protection mechanism. Protection...

Explain Protection mechanism. Protection mechanism: The subsequent mechanisms are commonly utilized for protecting files having programs and data. (a) Access controls list

Briefly define the term isotype, Question: (a) (i) Briefly define the t...

Question: (a) (i) Briefly define the term "Isotype". (ii) With the help of diagrams, describe the rules of "Isotype". (b) Elaborate on your understanding of internationa

Control traffic flowing in and out of the network, Firewalls use one or mor...

Firewalls use one or more of three methods to control traffic flowing in and out of the network:  Packet filtering - Packets (small chunks of data) are examined against a s

Cryptography, Basically I need implement program using LC3 assembly languag...

Basically I need implement program using LC3 assembly language where I can type any message using ASCII code (this will my input). Then read the output in cipher text. It has to be

Answer, Write a program to find the area under the curve y = f(x) between x...

Write a program to find the area under the curve y = f(x) between x = a and x = b, integrate y = f(x) between the limits of a and b. The area under a curve between two points can b

What do you mean by single construct in fortan, Q. What do you mean by Sing...

Q. What do you mean by Single Construct in FORTAN? Single construct specifies the associated structured block is executed by just one thread in team (not essentially the master

Explain star topology, Explain Star topology. A network utilizes a star...

Explain Star topology. A network utilizes a star topology if each computer attach to a central point. The following figure demonstrates the concept: Star Topology

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd