Which techniques are utilized to gain on the number pairs, Computer Engineering

Assignment Help:

Which techniques are utilized to gain on the number pairs and also explain how it helps in connecting number of subscribers.

In rural areas, subscribers are usually dispersed. This is both unessential and expensive to give a dedicated pair for each subscriber. Three techniques are utilized to gain on the number pairs are as following:

1. Parity lines

2. Concentrators

3. Carrier Systems.

In first technique, two or more subscribers are linked to the one line that is known as parity line. This scheme is not utilized commonly as this has a number of drawbacks. Only one subscriber at a time can utilize the line. Selective ringing is not easy and privacy is not preserved. Dialing in between two subscribers on similar line is not possible.

In second technique, a concentrator expander (CE) is utilized near the cluster of users and other one at the exchange end as demonstrated in figure.

Only some junction lines are run among the CEs that have switching ability. Classically, a ratio of 1:10 in between the subscriber lines and the junction lines is used. The CE at the exchange end remotely powers and controls the concentrator expander at the subscriber end.

2252_Concentrator-expander connection for dispersed subscribers.png

FIG - Concentrator-expander connection for dispersed subscribers.


Related Discussions:- Which techniques are utilized to gain on the number pairs

Failures, FAILURES Since reliability engineering is focused on the surv...

FAILURES Since reliability engineering is focused on the survivability or absence of failures, it is more concerned about failures,  understanding  their causes and defining re

Catch output from child tasks, Q. Catch output from child tasks? ...

Q. Catch output from child tasks? int pvm_catchout( FILE *ff ) Catch output from child tasks. ff is file descriptor on which we write collected output. The defau

Over fitting considerations - artificial intelligence, Over fitting Conside...

Over fitting Considerations - artificial intelligence Left  unexamined ,  back  propagation  in  multi-layer  networks  may  be very susceptible  to over fitting itself to the

Explain b2c -business to consumer, B2C -Business to Consumer  This is w...

B2C -Business to Consumer  This is where the consumer admittance the system of the supplier. It is still a two-way function but is usually complete solely by the Internet.

Asp.net, how work for asp.net

how work for asp.net

What are addressing modes, What are Addressing Modes Many of instructio...

What are Addressing Modes Many of instructions that a computer actually executes during running of a program concern movement of data to and from memory. It is not possible sim

What is stack, Stack is a portion of RAM used for saving the content of Pro...

Stack is a portion of RAM used for saving the content of Program Counter and common purpose registers. LIFO stacks, also called as "push down" stacks, are the conceptually easi

What do you meant by extranets, Extranets can be also used to connect an in...

Extranets can be also used to connect an intranet to Internet so that remote offsite access can be made in a company's intranet by an authorized individual. This can facilitate thr

Target _self, TARGET = "_self" "_self" puts the new document in the s...

TARGET = "_self" "_self" puts the new document in the same window and frame as current document. "_self" works the same as if you hadn't used TARGET at all.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd