Explain time switching, Computer Engineering

Assignment Help:

Explain Time Switching.

Time Switches: The principle of a time switch is demonstrated in figure. This connects an incoming n channel PCM highway to an outgoing n channel PCM highway. As any incoming channel can be connected to one outgoing channel, this is corresponding to space division cross point matrix along with n incoming and n outgoing trunks, as demonstrated in figure. Time-slot interchange is carried out through two stores, each containing a storage address for each channel of the PCM frame. The speech store consists of each data of the incoming time-slots (that is its speech sample) at a matching address. All address of the connection store corresponds to a time slot upon the outgoing highway. This contains the number of the time-slot on the incoming highways that sample is to be transmitted in which outgoing time-slots. Information is read in the speech store cyclically in synchronism with the incoming PCM systems; however, random access read out is utilized .The connection store has cyclic read out, although writing in is non cyclic. To set up a connection, the number (X of the time-slot of an incoming channel is written in the connection store at the address equivalent to the selected outgoing channel (Y ).Throughout each cyclic scan of the speech store ,the incoming PCM sample from channel X is written in address X. Throughout each cyclic scan of the connection store, the number X is read out at the starting of time-slot Y. It is decoded to select address X of the speech store, which contents are read out and sent over the outgoing highway.

504_Time Switch.png

FIG - Time Switch


Related Discussions:- Explain time switching

What is a union, What is a union ? A union, like a structure, is a derive...

What is a union ? A union, like a structure, is a derived type. Unions follow the same syntax as structures but have members that share storage. A union type defines a set of alt

Algorithmic complexity theory, Algorithmic Complexity theory: Moreover...

Algorithmic Complexity theory: Moreover a similar situation occurs in broad to specific ILP systems when the inference rules are deductive thus they specialize. So at some sta

What is the difference between = = = and = =, What is the difference betwee...

What is the difference between = = = and = = ? output of "==" can be 1, 0 or X. output of "===" can only be 0 or 1. When you are comparing 2 nos using "==" and if one/bo

Write shorts notes on digital signature, Write shorts notes on Digital Si...

Write shorts notes on Digital Signature. This method is used to authenticate the sender of a message. For sign a message, the sender encrypts the message by using a key ident

Explain about barrier, Q. Explain about Barrier? Barrier: No actual tra...

Q. Explain about Barrier? Barrier: No actual transfer of data takes place in this mode unless all the processors involved in the communication execute a particular block, calle

Double negation - artificial intelligence, Double Negation - Artificial int...

Double Negation - Artificial intelligence: Always parents are correcting their children for the use of double negatives, but we have to be very alert with them in natural langu

Pc cross assembler, 1.0 By working throughthe first time guide this will ga...

1.0 By working throughthe first time guide this will gain familiarity with the on board monitor and the PC cross assembler  After connecting the system to the terminal program,

What is winchester technology, What is Winchester technology? The disk ...

What is Winchester technology? The disk and the read/write heads are placed in a sealed air-filtered enclosure known as Winchester technology.

What is cmp instruction, What is CMP instruction Comparison instruction...

What is CMP instruction Comparison instruction (CMP) is a subtraction that changes only the flag bits; destination operand never changes. A comparison is useful for checking th

Determine about the security- accidental damage, Determine about the securi...

Determine about the security- accidental damage accidental damage is best guarded against by keeping back up files or use Grandfather-Father-Son (GFS) method; also use of passw

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd