Antenna Network of 16.4m Earth Station , Computer Networking

Assignment Help:

(a) Std "A" 16.4 m C-BAND EARTH STATION (1996)

This is the main system of this station and provides connectivity to most of the countries through dedicated transponder channels. This Earth Station is aligned with INTELSAT IOR 60°-East satellite and can access IOR 62°C-East in case of contingency. There are total 4587 International voice circuits (37 Carriers,18 Countries, and 21 Operators) as on 31st December, 2009. 2 Mbps internet

 

downlink and occasionally supports NEPAL TV from this system. Technical Specification of 16.4 m Antenna Network

Frequency band  : C Band

Antenna Size      : 16.4 m

Polarization        : Circular

Carrier Size       : IDR (2 Mbps/ Carrier)

G/T                   : 36.5Deg/K

SSPA Size          : 400 Watt

 

 

1283_Block Diagram of 16.4m Earth Station.jpg


Related Discussions:- Antenna Network of 16.4m Earth Station

Communication protocol - internet protocol, The Internet protocol mentions ...

The Internet protocol mentions the rules that describe the details of how computers communicate. It exactly mentions how a packet should be formed & how a router should forward eac

How many cables are needed, QUESTION a) List the seven layers of the IS...

QUESTION a) List the seven layers of the ISO-OSI model and briefly describe the role of each layer b) Describe the functions of the following intermediate systems- Rep

Source to destination data transfer - datagram approach, Source to Destinat...

Source to Destination Data Transfer - Datagram approach - Each packet is treated independently. - Every pkt will take its own path to reach the destination. - There i

Discuss the interdependence of networking hardware, Discuss the interdepend...

Discuss the interdependence of networking hardware and software. Is it possible to have one without the other? Explain

Options negotiation - transport layer, Options Negotiation To use any ...

Options Negotiation To use any of the options first  requires option  negotiation between the client  and server. Four  control  characters are used for  this purpose.

Describe about cryptography, Q. Describe about Cryptography? - Some med...

Q. Describe about Cryptography? - Some media cannot be protected from unauthorized reception (or interception) - Encryption involves transforming the original information in

Message passing libraries mpi and pvm, In this part, we shall talk about ab...

In this part, we shall talk about about message passing libraries. In history, various message passing libraries have been available since the 1980s. These executions differed subs

Explain about flow control, Q. Explain about Flow Control? - Signifies...

Q. Explain about Flow Control? - Signifies to ask the transmitter to stop/resume sending in data - Required when DTE to DCE speed > DCE to DCE speed - (Exampl

Access-list range for an extended ip access-list, Recognize the access-list...

Recognize the access-list range for an extended IP access-list? Ans) IP extended access-lists use the number range of 100-199.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd