Integrated services digital network service, Computer Engineering

Assignment Help:

Whole idea of ISDN is to digitize the telephone network to permit transmission of video, audio and text over existing telephone lines. The purpose of ISDN is to provide fully integrated digital services to users.

Use of ISDN for accessing the Internet has breathed new life into ISDN service. ISDN's slow acceptance was due mostly to a lack of a need for its capabilities. Being a digital interface, ISDN has provided a means for accessing web sites efficiently and quickly. In response to this new demand, telephone companies are speedily adding ISDN services.

ISDN standard defines three channels types, each with different transmission rate: bearer channel (B), data channel (D) and hybrid channel (H) (see the below table)

Channel 

Data Rate (Kbps)

64

D

16, 64

H

384, 1536, 1920

B channel is defined at a rate of 64 Kbps. It is the fundamental user channel and can carry any type of digital information in full duplex mode as long as required transmission doesn't exceed 64 kbps. A data channel can be either 16 or 64 kbps depending on the needs of user used to carry control signals for B channels.

Of two basic rate B channels, one is used to upload data to Internet and one to download from the Internet. D Channel helps in setting up connection and sustaining flow control. There are 3 ways ISDN can be used to interface to Internet, by employing an adaptor, modem or bridge/router. ISDN adaptors and modems limit access to a single user. Both terminate line into an ISDN service. Main difference between them is that ISDN modem takes Internet traffic and pushes it through computer serial port, whereas , faster ISDN adaptor connects directly to computer's buses.

ISDN routers/bridge allow for local network connections to be made by ISDN to Internet. ISDN termination is made into an Ethernet-type LAN so that numerous users can achieve access to Net by a single access address. Transfer rates between user and Internet are between 56 and 128 Kbps.


Related Discussions:- Integrated services digital network service

How many lines of address bus used for memory of 2048 bytes, How many lines...

How many lines of address bus must be used to access 2048 bytes of memory when available RAM chips 128 × 8.  How many lines of these will be common to each chip? Ans. AS chips

Difference between static and dynamic ram, Static RAM: No refreshing, 6 to ...

Static RAM: No refreshing, 6 to 8 MOS transistors are needed to form one memory cell, Information stored as voltage level in a flip flop. Dynamic RAM: Refreshed periodically, 3

Name the modes of 8255 programmable peripheral interface, What are the diff...

What are the different modes in that 8255 Programmable Peripheral Interface (PPI) can operate?  24 I/O lines in 3-8-bit port groups - A, B, C A, B can be 8-bit input

Calculations for a standard vga graphics screen, Q. Calculations for a stan...

Q. Calculations for a standard VGA graphics screen? Let's do the calculations for a standard VGA graphics screen (640×480) using 16 colours. Total number of Pixels = 640 ×48

What will exactly the hide statement do, What will exactly the hide stateme...

What will exactly the hide statement do? For displaying the details on secondary lists needs that you have previously stored the contents of the selected line from within the

Define interrupt and isr, Define interrupt and ISR? An interrupt is a r...

Define interrupt and ISR? An interrupt is a request from an I/O device for service by the processor. The processor gives the requested service by implementing the interrupt ser

Discuss different mode of centralized stored program control, Explain SPC. ...

Explain SPC. Also discuss the different modes of Centralized SPC In stored program control systems, set of instructions or a program to the computer is stored into its memory a

Propositional inference rules, Propositional Inference Rules: Proposit...

Propositional Inference Rules: Propositional Inference Rules Equivalence rules are mostly useful because of the vice-versa aspect, that means like we can search backwards and

Automated injection, There are tools to automate the process of SQL Injecti...

There are tools to automate the process of SQL Injection into login and other fields. One hacker process, using a one tool, will be to search out a number of weak targets using Goo

Micooperation, please suggest me ,how to write microopertions,and study for...

please suggest me ,how to write microopertions,and study for computer architecture

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd