Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Electrical & Electronics Expert

problem 1: How does a DSU distinct from a modem?

problem 2: What is the relationship between the number of slots in a frame and the number of input lines for synchronous TDM? And also for synchronous TDM?

problem 3: A DS-0 signal has a data of 64 kbps. Where does this number come from?

problem 4: Given the following information, find out the minimum bandwidth for the path:

• FDM multiplexing.
• Five devices, each requiring 4000 Hz.
• 200- Hz guard bands for each device.

problem 5: Five signal sources are multiplexed by using synchronous TDM. Each source generates 100 characters per second. Suppose that there is byte interleaving and that each frame needs one bit for synchronization. What do you mean by frame rate? What is the bit rate on the path?

problem 6: Draw the synchronous TDM frames exhibiting the character data given the information below:

• Four signal sources.
• Source one message: TEG
• Source two message: A
• Source three message:
• Source four message: EFIL

What would be the information in each TDM frame when transmission is asynchronous and the frame size is three characters per frame?

problem 7: The T-2 line provides a 6.312 Mbps service. Why is this number not 4 × 1.544 Mbps?

problem 8: Suppose there is a small town of 500 households, each with one telephone. If every phone connection is point-to-point (a dedicated line), how many total lines are essential? How can multiplexing help?

problem 9: If a single mode optical fiber can transmit at 2 Gbps, then how many telephone channels can one cable carry?

problem 10: Compute the overhead (in bits) per voice channel for each T line. Find out the percentage of overhead per voice channel?

Electrical & Electronics, Engineering

  • Category:- Electrical & Electronics
  • Reference No.:- M97255

Have any Question? 


Related Questions in Electrical & Electronics

One of the attacks an intruder can apply to a simple cipher

One of the attacks an intruder can apply to a simple cipher like an additive cipher is called the ciphertext attack. In this type of attack, the intruder intercepts the cipher and tries to find the key and eventually the ...

1 apply the law of conservation of mass to an element in a

1. Apply the law of conservation of mass to an element in a polar coordinate system and obtain the continuity equation for a steady, two-dimensional, incompressible flow. 2. In cartesian coordinates, show that may be wri ...

Consider a bar element as shown in the figure the

Consider a bar element as shown in the figure. The cross-sectional areas are A 1  and A 2  at nodes 1 and 2, respectively, and vary linearly. In addition, the gravitational acceleration is applied along the axial directi ...

Suppose that a continuous-time system is described by the

Suppose that a continuous-time system is described by the impulse response a. Compute the transfer function of the system. b. Find out if the system is BIBO stable. c. Plot the poles and the zeros of the system. d. Write ...

A square block of surface area a on all sides is under pure

A square block of surface area A on all sides is under pure shear deformation due to the uniformly distributed load F on the top surface, as shown in the figure. The deformation of the block is such that the deformed coo ...

1 state the relationship between polarization current

1. State the relationship between polarization current density and electric field intensity. How is it taken into account in Maxwell's equations? 2. What is the revised definition of D? 3. State the relationship between ...

1 what is a poynting vector what is its physical

1. What is a Poynting vector? What is its physical significance? 2. What is the physical interpretation of the surface integral of the Poynting vector over a closed surface? 3. Discuss how the fields far from a physical ...

1 assume an application program uses separate audio and

1. Assume an application program uses separate audio and video streams during an RTP session. How many SSRCs and CSRCs are used in each RTP packet? 2. Can we say UDP plus RTP is the same as TCP? 3. Why does RTP need the ...

1 explain why private-public keys cannot be used in

1. Explain why private-public keys cannot be used in creating a MAC. 2. The nonce in Figure 31.22 is to prevent a replay of the third message. Eve cannot replay the third message and pretend that it is a new request from ...

Givena perform all the necessary tests and determine if

Given (a) Perform all the necessary tests and determine if these fields represent a uniform plane wave propagating in a perfect dielectric medium. (b) Find the permittivity and the permeability of the medium.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen