Discuss briefly subscriber loop system, Computer Engineering

Assignment Help:

Discuss briefly subscriber loop system.

Subscriber Loop System: Every subscriber in a telephone network is connected usually to the nearest switching office using a dedicated pair of wires. Subscriber loop refers to such pair of wires. It is widely to run physically independent pairs from every subscriber premises to the exchange. This is far easier to lay cables containing a number of pairs of wires for various geographical locations and run individual pairs as needed by the subscriber premises.

430_Cable Hierarchy For Subscriber Loops.png

MDF = main distribution frame; MF = main feeder; FP = feeder point; BF = branch feeder; DW = drop wires; DP = distribution point; DC = distribution cable

FIG - Cable Hierarchy For Subscriber Loops.

Usually four levels of cabling are used as demonstrated in figure. At the subscriber end, the drop wires are acquired to the distribution point. These drop wires are the single pairs which run in the subscriber premises. On the distribution point, the drop wires are linked to wire pairs in the distribution cables. Several distribution cables from nearby geographical locations are terminated on a feeder point; here they are connected to branch feeder cables that are linked to the main feeder cable, in turn. This main feeder cables carry a larger number of wire pairs, classically 100-2000, than the distribution cables that carry usually 10-500 pairs. The feeder cables are finished on a main distribution frame (MDF) at the exchange. The subscriber cable pairs emanating by the exchange are also terminated at the main distribution frame.


Related Discussions:- Discuss briefly subscriber loop system

What are the two levels in defining a match code, What are the two levels i...

What are the two levels in defining a Match Code? Match Code Object. Match Code Id.

Exponential search, Exponential Search Another alternative to variable ...

Exponential Search Another alternative to variable size decrease-and-conquer search is known as exponential search. This algorithm begins searching at the beginning of the list

What do you mean by work flow automation, What do you mean by work flow aut...

What do you mean by work flow automation? Work Flow Automation: Organizations frequently standardize processes across the association and encourage users to accept them. E

Can 8259 be interfaced with 8085 via the trap pin, I think yes...so if 8259...

I think yes...so if 8259 gives interrupt then it will be serviced instantly but since into pin is left hanging the insr bit will never be set...and so whenever any interrupt occurs

Provide a diagrammatic interpretation of the hardware stack, a) Prototype ...

a) Prototype a macro known AP which takes 4 integer parameters n (number of terms), a (first term), l (last term) and Sum (sum of n terms), provided that: Sum = (a+l)*n/2 b)

Illustrate about the problem statement, Illustrate about the Problem statem...

Illustrate about the Problem statement Problem statement would not be incomplete, inconsistent and ambiguous. Try to state the requirements precisely and point to point. Do no

Explain about the acoustic tablet, Explain about the Acoustic tablet Ac...

Explain about the Acoustic tablet Acoustic (or sonic) tablet use sound waves to detect a stylus position. Either strip microphones or point microphones can be used to detect th

Example of bitwise-and operator, Example of Bitwise-AND Operator In the...

Example of Bitwise-AND Operator In the following example, the bitwise-AND operator (&) compares the bits of two integers, nNumA and nNumB: // Example of the bitwise-AND oper

Explain the relationship between translated & linked address, Explain the r...

Explain the relationship amongst Translated address and Linked address. Translated address: Address assigned through the translator Linked address: Address assigned

Explain the virtual memory, In computing, virtual memory is a memory manage...

In computing, virtual memory is a memory management method developed for multitasking kernels. This technique virtualizes computer architecture's various forms of computer data sto

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd