Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What are the different types of distributing frames used in exchanges?
The various distribution frames used in exchange are demonstrated in figure. Every subscriber in a telephone network is linked generally to the nearest switching office through means of a dedicated pair of wires. Subscriber loop considers to this pair of wires. This is unwisely to run physically independent pairs from all subscriber premises to the exchange. This is far easier to lay cables having a number of pairs of wires for several geographical locations and run individual pairs as needed by the subscriber premises.
FIG - Cable Hierarchy For Subscriber Loops.
Here MDF = main distribution frame;
MF = main feeder;
FP = feeder point;
BF = branch feeder;
DW = drop wires;
DP = distribution point;
DC = distribution cable
Usually four levels of cabling are used as demonstrated in figure. At the subscriber end, the drop wires are acquired to a distribution point. The drop wires are the single pairs which run in the subscriber premises. On the distribution point, the drop wires are linked to wire pairs in the distribution cables. Several distribution cables from nearby geographical locations are terminated on a feeder point; here they are connected to branch feeder cables that, in turn, are linked to the main feeder cable. This main feeder cables carry a larger number of wire pairs, classically 100-2000, than the distribution cables that carry usually 10-500 pairs. The feeder cables are finished on a main distribution frame (MDF) at the exchange. The subscriber cable pairs emanating by the exchange are also terminated at the main distribution frame.
Explain deadlock detection algorithm for single instance of each resource type. For single instance of each resource type the deadlock detection algorithm: (i) Maintain a wa
What are the advantages and disadvantages of public key cryptography? Advantages and Disadvantages: Improved security and convenience: private keys never require be trans
sadasdasd
how to implement car rental system program.
Problem: (i) What are the main threats that an organisation holding sensitive data, such as Public Data, on computer storage must guard against? (ii) To protect such data,
what is relationship among objects in software engineering??
a) What command do you use to list all listening sockets? The output should also contain the name of the program to which the socket belongs. b) Write the command to use to
Q. Why are binary, octal and hexadecimal used for computer applications? Q. Perform the following: (189.3) 10 = (?) 2
Q. What is Gustafsons Law? Amdahl's law is appropriate for applications where response time is significant. On the other hand there are numerous applications that necessitate
The velocity of sound in air is 49.02 feet per second where is the air temperature in degrees Rankine. Write a function to execute this. If just 1 argument is passed to the f
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd