Explain public switched telephone network, Computer Engineering

Assignment Help:

Explain Public Switched Telephone Network.

PSTN (Public Switched Telephone Network): This is Public Switched Telephone Network (PSTN), which accommodates two types of subscribers as: public and private. The subscribers to the private sector are customers who lease equipment, service from telephone companies and transmission media facilities on a permanent basis. The leased circuits are configured and designed for their utilization only and are frequently referred to as dedicated line circuits or private line circuits. For illustration, large banks do not desire to share their communication network along with other users, but this is not effective for them to construct their own networks. Thus, facilities from public telephone companies, banks lease equipment and fundamentally operate a private telephone or data network inside the PSTN. The public telephones companies are for a moment called providers, like they lease equipment and give service to other private organizations, companies and government agencies. Both MANs and WANs (i.e. most metropolitan area networks and wide area networks) uses private line data circuits and one or more service provider. Subscribers to the public sector of the PSTN share equipment and facilities which are available to all the public subscribers to the network. Such equipment is appropriately termed as common usage equipment, that includes transmission facilities and telephone switches. Everyone with a telephone number is a subscriber to the public sector of the PSTN. Because subscribers to the public network are interconnected only temporarily by switches, the network is frequently appropriately called the public switched telephone network (PSTN) and occasionally simply as the dial-up network. This  is possible to interconnect telephones and modems along with one another over huge distance in fraction of a second by means of an elaborate network contains of central offices, cables (as optical and metallic), switches and wireless radio systems which are connected through routing nodes here a node is a switching point. When someone talks regarding the public switched telephone network, they referring to the combination of lines and switches which from a system of electrical routes by the network.


Related Discussions:- Explain public switched telephone network

Java''s layout managers give over traditional windowing syste, Java uses la...

Java uses layout managers to lay out components in a consistent manner across all windowing platforms. As Java's layout managers aren't tied to absolute sizing and positioning, the

Write the truth table to realize the function nand gate, For F = A.B.C +...

For F = A.B.C + B.C.D ‾ + A ‾.B.C, write  the  truth  table to realize the function using NAND gates only ? Ans. Logic Function given as F = ABC + BC‾D + A‾BC, simplification o

What is skew, What is skew? Clock Skew: In circuit design, clock ske...

What is skew? Clock Skew: In circuit design, clock skew is a phenomenon within synchronous circuits wherein the clock signal (sent through the clock circuit) arrives at dive

Determine the logic gate having input 0 and output 1, The output of a logic...

The output of a logic gate is 1 when all its inputs are at logic 0. The gate is either ? Ans. When all inputs of logic gate at logic 0 and output is 0. The gate is either a NOR

What are drawbacks of electronic data interchange processes, What are the d...

What are the drawbacks of Electronic Data Interchange processes? Disadvantages of EDI processes are given below: 1. The X12 standard is so huge and general 2. Electron

m-files and the power point presentation, Power point presentation Arra...

Power point presentation Arrange a 20 minutes power point presentation showing the original and processed filters.  Discuss the methods used for processing and comment on each r

Simulate a worm propagation considering traffic delay, At time t when an in...

At time t when an infected machine scans and finds a vulnerable machine, the vulnerable one will be compromised and start to scan and infect others at time t+X, where X is a r.v. f

print the sum of the numbers in the file, Make a file which kepts on every...

Make a file which kepts on every line a letter, a space, and a real number.  For example, it may look like this: e 5.4 f 3.3 c 2.2 f 1.1 c 2.2 Write a script that uses textscan to

Enumerate in brief about the intranet security policy, Enumerate in brief a...

Enumerate in brief about the Intranet security policy An Intranet security policy is a very broad topic and it cannot be covered easily in few pages since it differs from situa

What are user threads, What are User threads   User threads are support...

What are User threads   User threads are supported above the kernel and are executed by a thread library at the user level. Thread creation & scheduling are done in the user sp

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd