Explain public switched telephone network, Computer Engineering

Assignment Help:

Explain Public Switched Telephone Network.

PSTN (Public Switched Telephone Network): This is Public Switched Telephone Network (PSTN), which accommodates two types of subscribers as: public and private. The subscribers to the private sector are customers who lease equipment, service from telephone companies and transmission media facilities on a permanent basis. The leased circuits are configured and designed for their utilization only and are frequently referred to as dedicated line circuits or private line circuits. For illustration, large banks do not desire to share their communication network along with other users, but this is not effective for them to construct their own networks. Thus, facilities from public telephone companies, banks lease equipment and fundamentally operate a private telephone or data network inside the PSTN. The public telephones companies are for a moment called providers, like they lease equipment and give service to other private organizations, companies and government agencies. Both MANs and WANs (i.e. most metropolitan area networks and wide area networks) uses private line data circuits and one or more service provider. Subscribers to the public sector of the PSTN share equipment and facilities which are available to all the public subscribers to the network. Such equipment is appropriately termed as common usage equipment, that includes transmission facilities and telephone switches. Everyone with a telephone number is a subscriber to the public sector of the PSTN. Because subscribers to the public network are interconnected only temporarily by switches, the network is frequently appropriately called the public switched telephone network (PSTN) and occasionally simply as the dial-up network. This  is possible to interconnect telephones and modems along with one another over huge distance in fraction of a second by means of an elaborate network contains of central offices, cables (as optical and metallic), switches and wireless radio systems which are connected through routing nodes here a node is a switching point. When someone talks regarding the public switched telephone network, they referring to the combination of lines and switches which from a system of electrical routes by the network.


Related Discussions:- Explain public switched telephone network

Determine the decimal equivalent of hexadecimal number, The hexadecimal num...

The hexadecimal number for (95.5) 10 is ? Ans. (95.5) 10 = (5F.8) 16 Integer part Fractional part 0.5x16=8.0

Architecture, write a program in assembly language using emu8086 so that th...

write a program in assembly language using emu8086 so that the input string can contain both lower and upper case letters and any other character and the output will be the reverse

Bidirectional search, Bidirectional Search: We've concentrated so far ...

Bidirectional Search: We've concentrated so far on the searches where the point of view for the search is to find a solution, but not the path to the solution. Like any other

How do you decide which integer type to use, It depends on our requirement....

It depends on our requirement. When we are needed an integer to be stored in 1 byte (means less than or equal to 255) we use short int, for 2 bytes we use int, for 8 bytes we use l

What are the entities that swapped out of the main memory, What are the ent...

What are the entities that are swapped out of the main memory while swapping the process out of the main memory? All memory space occupied by the process, process's u-area, and

Real-time systems and control, A group report with no more than three stude...

A group report with no more than three students per group is to be handed in to explain your design procedures and simulation results. Representative graphical system outputs (clea

Describe some of applications of buffer, Describe some of applications of b...

Describe some of applications of buffer? Applications of buffer: a. They are utilized to introduce tiny delays. b. They are utilized to eliminate cross talk caused becaus

State the scope of security policy, State the scope of security policy ...

State the scope of security policy The scope of security policy depends on aspects such as the size of the Intranet site, type of information hosted on it, and the number of u

Canonical genetic algorithm - mating, Canonical genetic algorithm - Mating:...

Canonical genetic algorithm - Mating: In such a scenario this continues until the number of offspring that is produced is the required number. Further this required number is

The function code currently active, The Function code currently active is a...

The Function code currently active is ascertained by what Variable? The function code at present active in  a Program can be ascertained from the SY-UCOMM  Variable.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd