Explain 100 line exchange with two-motion line finders, Computer Engineering

Assignment Help:

Explain 100 line exchange with two-motion line finders.

Design: In such design, here are 24 line finders. When any of the 100 subscribers has to find access to any of the 24 two-motion selectors, this is necessary that every line finder is able of reaching any of the 100 subscribers. Conversely, each line finder should have 100 outlets. For this purpose, two motion selectors have to be used as line finders. The configuration is demonstrated in figure. The corresponding outlets of the line finders are commoned. Likewise, the outlets of the numerical selectors are commoned also.

While the start condition is received, line finder is caused to hunt vertically till the wipers reach a marked level. The vertical hunting is after that stopped and the horizontal hunt commences to get a particular marked contact in this level. This may be noted that into the extreme case, the line finder need take 20-steps -10 vertical and 10 horizontal -before a line is determined. The line finders are made to step automatically, by using interrupter contact mechanism. If the line finder locates the subscriber line, start condition is removed, the allotter switch steps on to the subsequent free line finder in readiness for additional calls, and the numerical selector sends out the dial tone to the subscriber in readiness to get dialing pulses. After that the establishment of the connection proceeds in the usual way.

Evidently, Design 3 is by far the best for a 100-line exchange. When we had used uni selectors as line finders, this would have been essential to divide subscriber's line in small groups of, as 24 each. These designs involving groupings, function efficiently only in certain specific traffic conditions and usually lead to higher blocking probabilities.

2020_Line exchange with two-motion line finders.png

FIG - 100-Line exchange with two-motion line finders


Related Discussions:- Explain 100 line exchange with two-motion line finders

What are two verification points for use with web sites, 1. Use the Web Sit...

1. Use the Web Site Scan verification point to check the content of your Web site with each revision and make sure that changes have not resulted in defects. 2. Use the Web Sit

Build and explain a prototype model-uml, International Coal Coal-fire...

International Coal Coal-fired Power Generation Compared with other fossil fuels, burning coal produces relatively large amounts of atmospheric pollutants: carbon dioxide

Explain vector-scalar instructions, Vector-Scalar Instructions In this ...

Vector-Scalar Instructions In this category, when combination of vector and scalar are fetched and stored in vector register. These instructions are referred with the subsequen

What are different edi components and edi services, What are different EDI ...

What are different EDI components and EDI services? Different EDI components and EDI services are illustrated as: Three main components including services in EDI System are

Structural hazards - computer architecture, Structural hazards - computer a...

Structural hazards - computer architecture: A structural hazard takes place when a part of the processor's hardware is required by 2 or more than two instructions at the same

What are the four factors of open source software, What are the four signif...

What are the four significant factors that led to the development of open source software? 1. To diminish the high control value of the Proprietary Software 2. To avoid disc

Local variables and global variables in lingo programming, Question: (a...

Question: (a) Differentiate between local variables and global variables in Lingo programming. (b) Using examples differentiate between deleteProp() and deleteAt() function

Explain load sharing processor configuration of spc, Explain how a centrali...

Explain how a centralized SPC organization works under load sharing operation. Under load sharing operation, an incoming call is allocated randomly or in a predetermined sequen

Creation deductive inferences, Creation Deductive Inferences : Here we...

Creation Deductive Inferences : Here we have shown how knowledge can be represented in first-order logic or how rule-based expert systems expressed in logic can be constructed

Define the terms- action semantics and argouml, Define the terms- Action Se...

Define the terms- Action Semantics and  ArgoUML Action Semantics : Action semantics is a group of firms that have responded to the OMG's RFP to define the action semantics fo

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd