What are the different types of distributing frames, Computer Engineering

Assignment Help:

What are the different types of distributing frames used in exchanges?

The various distribution frames used in exchange are demonstrated in figure. Every subscriber in a telephone network is linked generally to the nearest switching office through means of a dedicated pair of wires. Subscriber loop considers to this pair of wires. This is unwisely to run physically independent pairs from all subscriber premises to the exchange. This is far easier to lay cables having a number of pairs of wires for several geographical locations and run individual pairs as needed by the subscriber premises.

558_Cable Hierarchy For Subscriber Loops.png

FIG - Cable Hierarchy For Subscriber Loops.

Here MDF = main distribution frame;

MF = main feeder;

FP = feeder point;

BF = branch feeder;

DW = drop wires;

DP = distribution point;

DC = distribution cable

Usually four levels of cabling are used as demonstrated in figure. At the subscriber end, the drop wires are acquired to a distribution point. The drop wires are the single pairs which run in the subscriber premises. On the distribution point, the drop wires are linked to wire pairs in the distribution cables. Several distribution cables from nearby geographical locations are terminated on a feeder point; here they are connected to branch feeder cables that, in turn, are linked to the main feeder cable. This main feeder cables carry a larger number of wire pairs, classically 100-2000, than the distribution cables that carry usually 10-500 pairs. The feeder cables are finished on a main distribution frame (MDF) at the exchange. The subscriber cable pairs emanating by the exchange are also terminated at the main distribution frame.


Related Discussions:- What are the different types of distributing frames

Explain the term - computer aided software engineering, Explain the term - ...

Explain the term - Computer Aided Software Engineering Production of software became much commercial. Software development tools were devised. Concept of Computer Aided Softwar

Role of internet, What are the roles of Internet, Intranet and extranet in ...

What are the roles of Internet, Intranet and extranet in e-business? Role of Internet, Intranet and extranet into e-business: The given information activities are carried

Explain the page stealer and the fault handler, How the Kernel handles both...

How the Kernel handles both the page stealer and the fault handler? The page stealer and the fault handler thrash because of the shortage of the memory. If the sum of the worki

Appropriate name for the superclass, Suppose that your team is then asked t...

Suppose that your team is then asked to expand the system. The publisher now wishes to make other computer science publications. As a team member, you are asked to make a class tha

Explain the working of master-slave JK flip flop, With relevant diagram exp...

With relevant diagram explain the working of master-slave JK flip flop. Ans. Master-Slave J-K FLIP-FLOP: A cascade of two S-R FLIP-FLOPS is a master-slave J-K FLIP-FLOP. One

Describe buffer of receiving process, Q. Describe buffer of receiving proce...

Q. Describe buffer of receiving process? MPI_Gather (Sendaddr, Scount, Sdatatype, Receiveaddr, Rcount, Rdatatype,Rank, Comm): 'Using this function process with rank' rank

What is inode, What is 'inode'? All UNIX files have its description kep...

What is 'inode'? All UNIX files have its description kept in a structure called 'inode'. The inode have info about the file-size, its location, time of last access, time of las

Difference among java beans & servlets, Java bean is a reusable component, ...

Java bean is a reusable component, where as the servlet is the java program which extends the server capability.

Describe real and protected mode, Describe Real and protected mode: Op...

Describe Real and protected mode: Operation of Real mode interrupt:   When microprocessor completes executing the current instruction, it concludes whether an interrupt is act

NETWORK ADMIN, Ask qDiscuss the risks of having a single root user and how ...

Ask qDiscuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems.uestion #Minimum 100 words accepted

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd