Question

Telecommunication Networks and Security: a) Sketch the hierarchy of the telecommication infrastructure. b)Explain the differences between...

Telecommunication Networks and Security:

a) Sketch the hierarchy of the telecommication infrastructure.

b)Explain the differences between data switches and data hubs.

c)What is a local loop?

d)What is signaling system used nowadays for PSTN?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1) The hierarchy of the telecommication infrastructure.

mmuu VHiei class 1 onal class 2 class 3 class 4 Toll centes Classe end obice Conne exchan

2) In data hub the data transmission is in the form of elctrical signals or bits
In data switch the data transmission is in the form of frames and packets . i.e frame (L2 switch) , frame and packets (L3 Switch)

3) Local Loop: The wire connection from the main telephone office to its local customers at home or businesses.

The local loop conncetion is usually on a pair of copper wires called twisted pair.

4)Signaling System 7 is an international telecommunications standard it defines on how the network elements in a PSTN swap information over a digital signaling network. The Nodes in the Signaling System network are called as signaling points.

Add a comment
Know the answer?
Add Answer to:
Telecommunication Networks and Security: a) Sketch the hierarchy of the telecommication infrastructure. b)Explain the differences between...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Q3(a) Explain TWO (2) differences between system with positive feedback and system with negative feedback. (b)...

    Q3(a) Explain TWO (2) differences between system with positive feedback and system with negative feedback. (b) With the aid of a block diagram, derive the closed-loop gain, Af of a negative feedback system. (c) An amplifier with a negative feedback has a midband gain of 47.96 dB and low cutoff frequency of 75 Hz. The feedback network of the system has a feedback factor (B) of 0.0022. (1) Determine the midband gain and the low cutoff frequency if the amplifier...

  • 1. (25pts) Unary phase diagranm (a) Explain the differences between "phase" and "component". b) S...

    just need c and d 1. (25pts) Unary phase diagranm (a) Explain the differences between "phase" and "component". b) Sketch the unary phase diagram of water. Explain triple point in the phase diagram of water. (c) Consider an energy supply system shown in the figure below. This plant supplies heat energy to the community by feeding hot water and returning the warm water which is cooled down due to the heat exchange in each building. Explain how you could increase...

  • Data Infrastructure: a. What is a data infrastructure for patient-generated health data? b. Describe the key...

    Data Infrastructure: a. What is a data infrastructure for patient-generated health data? b. Describe the key stakeholders the PGHD policy framework? c. Discuss all of the steps in the PGHD adoption curve. d. Discuss the challenges and needed actions for the following: • Patients • Clinicians • Researchers • Policymakers • Technology developers • Payers explain in detail

  • 7 The engineers of the telecommunication company tested the link between the sender and the receiver...

    7 The engineers of the telecommunication company tested the link between the sender and the receiver for a multimedia application, and found Q(x)=0.158 for the 256-OAM digital multimedia communication system. Can this system transmit data free from ISI problem with 10 kbps speed over a noisy channel of 5 kHz? Prove mathematically. Comment on the results. 8 A memoryless data source produces five different symbols (A, B, C, D, E) of probabilities of occurrence: PA=PB-PC=0.2, PD=0.3, and PE=0.1. Calculate and...

  • 1. (a) Explain the terms “data encryption, authentication, and message integrity,” often used in the networks...

    1. (a) Explain the terms “data encryption, authentication, and message integrity,” often used in the networks security literature. (3 Points) (b) Lorenzo likes to send to his close friend Art a secret market data related to their business using public key cryptography (RSA algorithm). He chooses two prime numbers 7 and 11, and a public key e = 13 to encrypt the data. Art uses d=37 to decrypt the data. Indicate why (e, 77) and (d, 77) are valid public...

  • 1.(a)Explain the differences between conduction and valence band with the aid of an energy diagram (b)Mention...

    1.(a)Explain the differences between conduction and valence band with the aid of an energy diagram (b)Mention seven differences between charge and current (c)Explain why ammeters are connected in series but not parallel (d)Explain why always a voltmeter is connected in parallel but not in series

  • QUESTION 1 a) What is a derivative security? b) What are the differences among a spot...

    QUESTION 1 a) What is a derivative security? b) What are the differences among a spot contract, a forward contract, and a futures contract? c) What is an option? How does an option differ from a forward or futures contract? What is the difference between a call option and put option? d) What is a swap? What is the difference between an interest rate swap and a currency swap? e) Which party is the swap buyer and which is the...

  • 1. Explain the differences between UPA and RUPA in regards to: a) Disassociation b) Apparent Authority...

    1. Explain the differences between UPA and RUPA in regards to: a) Disassociation b) Apparent Authority c) Marshalling d) Distribution of Assets

  • Which of the following statements is FALSE regarding evaluating networks of resistors and batteries? Please explain!...

    Which of the following statements is FALSE regarding evaluating networks of resistors and batteries? Please explain! Select the correct answer a. When following the direction of a (proposed) current, the voltage change across a battery is positive ( a voltage gain) b. The sum of the currents entering a junction (node) must equal the sum of the currents exiting that junction (node). c. The sum of the current around any closed loop must equal to zero d. The sum of...

  • Management Information System

    through studying the IT infrastructure of a relevant information system (IS)/ information technology (IT) used by selecting any organization of your choice locally or internationally The idea is to investigate the selected organization using the main components of IT (Hardware, software, services, data management and networking). Infrastructure Investigation, which is in a selected industry, should be carried out by using articles, websites, books and journal papers and /or interviews. In the report, you are expected to discuss:Executive Summary .     ...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT