What are the different types of distributing frames, Computer Engineering

Assignment Help:

What are the different types of distributing frames used in exchanges?

The various distribution frames used in exchange are demonstrated in figure. Every subscriber in a telephone network is linked generally to the nearest switching office through means of a dedicated pair of wires. Subscriber loop considers to this pair of wires. This is unwisely to run physically independent pairs from all subscriber premises to the exchange. This is far easier to lay cables having a number of pairs of wires for several geographical locations and run individual pairs as needed by the subscriber premises.

558_Cable Hierarchy For Subscriber Loops.png

FIG - Cable Hierarchy For Subscriber Loops.

Here MDF = main distribution frame;

MF = main feeder;

FP = feeder point;

BF = branch feeder;

DW = drop wires;

DP = distribution point;

DC = distribution cable

Usually four levels of cabling are used as demonstrated in figure. At the subscriber end, the drop wires are acquired to a distribution point. The drop wires are the single pairs which run in the subscriber premises. On the distribution point, the drop wires are linked to wire pairs in the distribution cables. Several distribution cables from nearby geographical locations are terminated on a feeder point; here they are connected to branch feeder cables that, in turn, are linked to the main feeder cable. This main feeder cables carry a larger number of wire pairs, classically 100-2000, than the distribution cables that carry usually 10-500 pairs. The feeder cables are finished on a main distribution frame (MDF) at the exchange. The subscriber cable pairs emanating by the exchange are also terminated at the main distribution frame.


Related Discussions:- What are the different types of distributing frames

Explain deadlock detection algorithm for single instance, Explain deadlock ...

Explain deadlock detection algorithm for single instance of each resource type. For single instance of each resource type the deadlock detection algorithm: (i) Maintain a wa

Advantages and disadvantages of public key cryptography, What are the advan...

What are the advantages and disadvantages of public key cryptography? Advantages and Disadvantages: Improved security and convenience: private keys never require be trans

Explain the significance of encryption, Problem: (i) What are the main...

Problem: (i) What are the main threats that an organisation holding sensitive data, such as Public Data, on computer storage must guard against? (ii) To protect such data,

Relation ship, what is relationship among objects in software engineering??...

what is relationship among objects in software engineering??

Listening sockets, a) What command do you use to list all listening sockets...

a) What command do you use to list all listening sockets? The output should also contain the name of the program to which the socket belongs.   b) Write the command to use to

Why are binary, Q. Why are binary, octal and hexadecimal used for computer ...

Q. Why are binary, octal and hexadecimal used for computer applications? Q. Perform the following: (189.3) 10 = (?) 2

What is gustafsons law, Q. What is Gustafsons Law? Amdahl's law is app...

Q. What is Gustafsons Law? Amdahl's law is appropriate for applications where response time is significant. On the other hand there are numerous applications that necessitate

two arguments are passed, The velocity of sound in air is 49.02 feet p...

The velocity of sound in air is 49.02 feet per second where is the air temperature in degrees Rankine.  Write a function to execute this.  If just 1 argument is passed to the f

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd