Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What are the different types of distributing frames used in exchanges?
The various distribution frames used in exchange are demonstrated in figure. Every subscriber in a telephone network is linked generally to the nearest switching office through means of a dedicated pair of wires. Subscriber loop considers to this pair of wires. This is unwisely to run physically independent pairs from all subscriber premises to the exchange. This is far easier to lay cables having a number of pairs of wires for several geographical locations and run individual pairs as needed by the subscriber premises.
FIG - Cable Hierarchy For Subscriber Loops.
Here MDF = main distribution frame;
MF = main feeder;
FP = feeder point;
BF = branch feeder;
DW = drop wires;
DP = distribution point;
DC = distribution cable
Usually four levels of cabling are used as demonstrated in figure. At the subscriber end, the drop wires are acquired to a distribution point. The drop wires are the single pairs which run in the subscriber premises. On the distribution point, the drop wires are linked to wire pairs in the distribution cables. Several distribution cables from nearby geographical locations are terminated on a feeder point; here they are connected to branch feeder cables that, in turn, are linked to the main feeder cable. This main feeder cables carry a larger number of wire pairs, classically 100-2000, than the distribution cables that carry usually 10-500 pairs. The feeder cables are finished on a main distribution frame (MDF) at the exchange. The subscriber cable pairs emanating by the exchange are also terminated at the main distribution frame.
Quantifiers and Variables - propositional model: There is one question is arrives that 'What do sentences containing variables mean?' In other way of words, how does a first-o
What are the steps involved in authentication? Steps in Authentication The control over the access of the resources in the repository is exercised in two steps namely Auth
Write a recursive algorithm to delete the leaves of a binary tree. Programming Requirements You must use the binary search tree code provided. Each algorithm must be impleme
Computer Arithmetic Data is manipulated with the help of arithmetic instructions in digital computers. Data is manipulated to produce the results necessary to provide solut
Q. Explain High performance of Instruction execution? High performance of Instruction execution: While mapping of HLL to machine instruction the compiler favours relatively sim
Q. Illustrate Cache DRAM? Cache DRAM (CDRAM) which is developed by Mitsubishi integrates a tiny SRAM cache (16Kb) on a generic DRAM chip. SRAM on the CDRAM can be used in two
Cache Misses Compulsory misses - it is caused by initial access to a block that has never been in the cache (also called cold start misses Capacity miss - it is cause
Indirect addressing A memory location is given that holds another memory location. This second memory location holds the real data. This mechanism solves problems caused by rea
1) Discuss various types of persuasive communication you might be needed to write or present in your professional and personal life. 2) Describe two ways to organize a resume
Explain about Computer architecture Computer architecture is the conceptual design and fundamental operational structure of a computer system. It is a blueprint and functional
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd