Explain crossbar exchange with all call processing steps, Computer Engineering

Assignment Help:

Explain crossbar exchange, with all call processing steps and diagrams.

The fundamental idea of crossbar switching is to give a matrix of n x m sets of contacts with only n + m activators or less to choose one of the n x m sets of contacts. It form of switching is also termed as coordinate switching as the switching contacts are arranged into a x-y-plane. The diagrammatic representation of a cross point switching matrix is demonstrated in figure. Now here is an array of horizontal and vertical wires demonstrated by solid lines. A set of horizontal and vertical contact points are connected to all these wires. The contact points form pairs, all pairs having a bank of three or four horizontal and a equivalent bank of vertical contact points. A contact point pair functions as a cross point switch and keeps separated or open when not in utilize. The contact points are mechanically mounted and also electrically insulated upon a set of vertical and horizontal bars demonstrated as dotted lines. The bars are attached, in turn to a set of electromagnets.

335_3 X 3 Crossbar Switching.png

FIG - 3 X 3 Crossbar Switching

If an electromagnetic energized, so the bar attached to this slightly rotates in a way which the contact points attached to the bar move closer to its facing contact points but don't in fact make any contact. At this time if an electromagnet in the vertical direction is energized, the matching bar rotates causing the contact points at the intersection of the two bars to close. It happens since the contact point move towards each other. For illustration if electromagnets M2 and M3' are energized, a contact is set-up at the cross point 6 as the subscriber B is connected to the subscriber C.


Related Discussions:- Explain crossbar exchange with all call processing steps

Structure tensor, what is structure tensor?how we calculate for image pixel...

what is structure tensor?how we calculate for image pixel?

Explain the regular expression and transition diagram, State the relation a...

State the relation among Regular Expression, Transition Diagram and Finite State Machines. By using a simple instance establish your claim.   Answer: For each regular language,

Explain Not recently used page replacement algorithm, Not Recently Used Pag...

Not Recently Used Page Replacement Algorithm The not recently used abbreviated as NRU page replacement algorithm works on the subsequent principle: while a page is referenced,

Finite state automaton, Once a finite state automaton (FSA) is designed, it...

Once a finite state automaton (FSA) is designed, its transition diagram can be translated in a straightforward manner into program code. However, this translation process is consid

Explain essential properties of distributed operating system, Describe the ...

Describe the essential properties of the Distributed Operating System Essential properties of Distributed operating systems: Sharing resources Calculation speed-up

What is synchronous reset, What is Synchronous reset? Synchronous reset...

What is Synchronous reset? Synchronous reset: Synchronous reset logic will synthesize to smaller flip-flops, mainly when the reset is gated along with the logic generating t

Resolution method - artificial intelligence, Resolution Method - Artificial...

Resolution Method - Artificial intelligence: A minor miracle happened in 1965 when Alan Robinson published his resolution function. This function uses a generalized format of t

Testmanagers wizard, TestManager has a wizard that you can use to copy or i...

TestManager has a wizard that you can use to copy or import test scripts and other test assets (Datapools) from one to another.

Ms access database through menu driven selections, Would you like to easily...

Would you like to easily automate your MS Access database through menu driven selections? This can be accomplished by producing a form with customized buttons that point to macr

Security features used in client-server types of network, Security features...

Security features used in Client-Server types of network are as follows :  i) Digital Signatures ii)  Encryption / Decryption iii) Secure Socket Layer (SSL) iv) Firewa

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd