Describe the various signalling techniques, Computer Engineering

Assignment Help:

Describe the various signalling techniques.

Signaling systems link the variety of transmission systems, switching systems and subscriber elements in telecommunication network to enable the network to acts as a whole.

Three forms of signaling are included in a telecommunication network:

1. Subscriber loop signaling.

2. Intra exchange or register signaling

3. Interexchange or inter register signaling

Subscriber loop signaling depends on the type of a telephone instrument used, in a telephone network.

The intra exchange signaling is internal to the switching system and is greatly dependent on the type and design of a switching system. This varies from one model to other even with similar manufacturer. This signaling does not include signaling system of the type needed on the switching network.

If interexchange signaling takes place among exchanges with common control subsystems, this is termed as Inter register signaling. The main reason of Inter register signaling is the exchange of address digits that pass from exchange to exchange on a link by link basis. Also Network wide signaling includes end to end signaling in between the terminating exchange and the originating exchange. This form of signaling is termed as line signaling. CCS does not utilize the speech or the data path for signaling. This uses a separate common channel for passing control signals for a group of information or trunks.


Related Discussions:- Describe the various signalling techniques

difference among primary and secondary storage device, In primary storage ...

In primary storage device the storage capacity is fixed. It has a volatile memory. In secondary storage device the storage capacity is not limited. It is a nonvolatile memory. Prim

Derive the expression of traffic capacity, Traffic Capacity is given by? ...

Traffic Capacity is given by? Traffic Capacity = Switching capacity × Theoretical maximum load.

How is basic authentication worked, How is basic authentication worked? ...

How is basic authentication worked? When an exact resource has been protected using fundamental authentication, Apache sends a 401 Authentication needed header along with the r

Explain the action of an interrupt processing routine, Explain the action o...

Explain the action of an interrupt processing routine? Action of an interrupt processing routine is as follows : 1. Save contents of registers of CPU. This action is not e

Standards for scan codes, Q. Standards for scan codes ? There are 3 sta...

Q. Standards for scan codes ? There are 3 standards for scan codes: Mode1 (83-key keyboard PC, PC-XT) and Mode2 (84-key AT keyboard) and Mode3 (101-key keyboard onwards). In Mo

Gralands robots, You have been contacted by Jean-Luc Picard commanding offi...

You have been contacted by Jean-Luc Picard commanding officer of Star Trek: The Next Generation. The Commander needs your support to develop a software routine to simulate the Robo

The complexity of adding two matrices, T he complexity of adding two matric...

T he complexity of adding two matrices of order m*n is mn

What start bit and stop bit, What start bit and stop bit The first bit ...

What start bit and stop bit The first bit known as the Start bit is always a zero and it is used to show the beginning of the character The last bit is known as the stop bit

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd