Explain the working of broad band isdn, Computer Engineering

Assignment Help:

Explain the working of broad band ISDN.

BISDN Configuration: Figure shows how access to the BISDN network is accomplished. All peripheral devices are interfaced to the access node of a BISDN network by a broadband distant terminal (BDT). The broadband distant terminal is responsible for electrical to optical conversion, multiplexing of peripherals, and keep of the subscriber's local system. Excess nodes concentrate some BDT's in high speed optical fiber line directed by a feeder point in a service node. Most of the control function for system excess is operated by the service node, as call processing, switching and administrative function and maintenance functions. All functional modules are interconnected in a star configuration and contain switching, gateway, administrative and also maintenance modules. The interconnection of the function module is demonstrated in figure. The central control hub serves as the end user interface for data traffic and control signaling maintenance. In essence, this oversees the operation of the modules.

1473_BISDN Functional Module Interconnection.png

FIG - BISDN Functional Module Interconnection

Subscriber terminal close to the control office may by pass the excess nodes completely and the directly connected to the BISDN network with a service node. BISDN nodes which used optical fiber cables can employ much wider band width and accordingly, have higher transmission rates and offer more channel handling ability than ISDN systems.


Related Discussions:- Explain the working of broad band isdn

Explain control word, What is control word? A control word is a word wh...

What is control word? A control word is a word whose individual bits show the various control signals.

What is a process scheduling, What is a Process Scheduling? Scheduling...

What is a Process Scheduling? Scheduling is a key element of the workload management software that usually performs several or all of: Queuing Scheduling Monito

Different types of coding in digital electronics, The code where all succes...

The code where all successive numbers differ from their preceding number by single bit is ? Ans. Gray Code, where all successive numbers are different from their preceding nu

Average enzyme activity , Activity of a some  enzyme was calculated  in ext...

Activity of a some  enzyme was calculated  in extracts from brain, heart and lung. In every  tissue,  the activity was calculated  various  times, giving the following results (in

Define underflow and overflow, Define underflow and overflow. Underflow...

Define underflow and overflow. Underflow: If the result the arithmetic operation including n-bit numbers is too small to show by n-bits, underflow is said to occur. Overflow

Segment combinations, Segment Combinations In 8086 assembler provides a...

Segment Combinations In 8086 assembler provides a means for combining segments declared in various modules. Some typical combine types are: 1.   PUBLIC: This combine directi

Linux, Explain about unix file system architecture

Explain about unix file system architecture

What is a null object in c++, It is an object of a number of classes whose ...

It is an object of a number of classes whose purpose is to indicate that a real object of that class does not exist. One common use for a null object is a return value from a membe

Logical user-centered interactive design methodology, Question: Logical...

Question: Logical User-Centered Interactive Design Methodology is a methodology that identifies six clear stages to help in software development while keeping the user in mind.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd