Integrated services digital network service, Computer Engineering

Assignment Help:

Whole idea of ISDN is to digitize the telephone network to permit transmission of video, audio and text over existing telephone lines. The purpose of ISDN is to provide fully integrated digital services to users.

Use of ISDN for accessing the Internet has breathed new life into ISDN service. ISDN's slow acceptance was due mostly to a lack of a need for its capabilities. Being a digital interface, ISDN has provided a means for accessing web sites efficiently and quickly. In response to this new demand, telephone companies are speedily adding ISDN services.

ISDN standard defines three channels types, each with different transmission rate: bearer channel (B), data channel (D) and hybrid channel (H) (see the below table)

Channel 

Data Rate (Kbps)

64

D

16, 64

H

384, 1536, 1920

B channel is defined at a rate of 64 Kbps. It is the fundamental user channel and can carry any type of digital information in full duplex mode as long as required transmission doesn't exceed 64 kbps. A data channel can be either 16 or 64 kbps depending on the needs of user used to carry control signals for B channels.

Of two basic rate B channels, one is used to upload data to Internet and one to download from the Internet. D Channel helps in setting up connection and sustaining flow control. There are 3 ways ISDN can be used to interface to Internet, by employing an adaptor, modem or bridge/router. ISDN adaptors and modems limit access to a single user. Both terminate line into an ISDN service. Main difference between them is that ISDN modem takes Internet traffic and pushes it through computer serial port, whereas , faster ISDN adaptor connects directly to computer's buses.

ISDN routers/bridge allow for local network connections to be made by ISDN to Internet. ISDN termination is made into an Ethernet-type LAN so that numerous users can achieve access to Net by a single access address. Transfer rates between user and Internet are between 56 and 128 Kbps.


Related Discussions:- Integrated services digital network service

Balanced trees and their operations, what is ment by avl tree n insertion n...

what is ment by avl tree n insertion n deletion ,2-3 tress insertion n deletion

What is data movement, Data movement instructions shift data from one locat...

Data movement instructions shift data from one location to another. The source and destination locations are verified by the addressing modes, and can be registers or memory. Many

What are the two phases in the advancement of linux, What are the two phase...

What are the two phases in the advancement of Linux? State some Applications of Open Source Systems? Finance Educational Data Storage and Management ERP (Ent

Persuasive communication , 1)   Discuss various types of persuasive communi...

1)   Discuss various types of persuasive communication you might be needed to write or present in your professional and personal life. 2)    Describe two ways to organize a resume

How reassembling of ip fragments is advantageous, Reassembling of IP fragme...

Reassembling of IP fragments at the ultimate destination is advantageous. Give reasons. Needing the ultimate destination to reassemble the fragments has two major advantages. F

Could tcp allow ip to checksum the data, Could TCP allow IP to checksum the...

Could TCP allow IP to checksum the data? TCP cannot permit IP to checksum data yet IP has its own checksum for its header. IP layer is fundamentally responsible for routing of

Grounding a variable - first-order logic, Grounding a variable - first-orde...

Grounding a variable - first-order logic: The perform of making ourselves clear about a variable by introducing an exists or a forall sign is called quantifying the variable.

Can you explain about internet protocol, Q. Can you explain about Internet ...

Q. Can you explain about Internet Protocol? Internet protocol specifies the rules which define the details of how computers communicate. It specifies exactly how a packet shoul

Explain a public key encryption system, Explain a public key encryption sys...

Explain a public key encryption system? A public key encryption system permits only the correct receiver to decode the data.

Mips assembly language equivalents , MIPS' native assembly code only has tw...

MIPS' native assembly code only has two branch instructions, beq and bne, and only one comparison instruction, slt. Using just these three instructions (along with the ori instruct

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd