• No results found

digital subscriber line

Symmetrical High-Speed Digital Subscriber Line (SHDSL) Channel Modelling

Symmetrical High-Speed Digital Subscriber Line (SHDSL) Channel Modelling

... Asymmetric digital subscriber line (ADSL) uses existing twisted pair telephone lines to create access paths for high-speed data communications and transmits at speeds up to ...

24

A Practical implementation of high-speed communication using digital subscriber line technology

A Practical implementation of high-speed communication using digital subscriber line technology

... VDSL data Very rates 1000 feet high bit rate Digital Subscriber Line: Modem for twisted-pair from 12.9 to 52.8 Mbps of 24 gauge twisted with but increasingly available Competitive Access[r] ...

67

Predicting Total Harmonic Distortion (THD) in Asymmetric Digital Subscriber Line (ADSL) Transformers using Simulation

Predicting Total Harmonic Distortion (THD) in Asymmetric Digital Subscriber Line (ADSL) Transformers using Simulation

... ADSL has proved a significant step in the development of digital subscriber line (DSL) technology, as it has probably the best defined standard (IEEE Standard T1.413-1995 [1]) that is actually ...

8

A Survey on Energy Efficient Transmission in Digital Subscriber Line

A Survey on Energy Efficient Transmission in Digital Subscriber Line

... .Digital subscriber line or Digital Subscriber Loop(DSL) is a type of Internet technology that have high speed transmission of digital data via the wires of a telephone ...

8

Alien Crosstalk Cancellation for Multipair Digital Subscriber Line Systems

Alien Crosstalk Cancellation for Multipair Digital Subscriber Line Systems

... Digital subscriber line (DSL) transmission is typically con- strained by crosstalk interference. As DSL technology ad- vances and processing power increases, the interest in tech- niques for ...

12

MERLIN LEGEND Communications System Basic Rate interface Supplemental Reference

MERLIN LEGEND Communications System Basic Rate interface Supplemental Reference

... If the 800 CO-BRI module functions as the local clock source, the maintenance software monitors all frame slip counters associated with all the activated Digital Subscriber Line (DSL) ports on the ...

154

Joint Multiuser Detection and Optimal Spectrum Balancing for Digital Subscriber Lines

Joint Multiuser Detection and Optimal Spectrum Balancing for Digital Subscriber Lines

... This paper investigates the benefit of multiuser detection and crosstalk cancellation in digital subscriber line systems. Computationally e ffi cient schemes which determine the op- timal transmit ...

13

A Novel Approach to Improve Triple Play Services Performance

A Novel Approach to Improve Triple Play Services Performance

... is Digital Subscriber Line (DSL), which is a broadband access technology making enable high-speed data transmissions over the available copper telephone wires ("local loops") that links ...

8

Consumer Awareness to Protect Internet Users – A Scenario

Consumer Awareness to Protect Internet Users – A Scenario

... the Digital subscriber line access multiplexer (DSLAM), Asynchronous transfer mode (ATM) and IP network); the core IP network and Internet peering arrangements; the service and application layers ...

5

Developing Framework For Secure Storage in Cloud Computing System

Developing Framework For Secure Storage in Cloud Computing System

... multirate digital signal processing (DSP) has traditionally been applied to the contexts of filter banks and ...of digital filter ...compression, digital audio processing, signal denoising, adaptive ...

6

Implementation of Switching System for 16 User Using VHDL

Implementation of Switching System for 16 User Using VHDL

... The aim of work was to enable us to design ICs for the Switching System. Presently switching systems uses multiplexers, routers, switches etc that leads to low efficiency as they are analog in nature and have a high ...

6

A Robust And Scalable Four Factor Authentication Architecture To Enhance Security For Mobile Online Transaction

A Robust And Scalable Four Factor Authentication Architecture To Enhance Security For Mobile Online Transaction

... According to Statista(2018), 87.7% of mobile phones, tablets and personal digital assistant (PDA) run on Android operating system followed with 12.1% of these devices execute instruction on iOS platform.All these ...

5

CMC ICT3207 Call Flow

CMC ICT3207 Call Flow

... Every subscriber in a telephone network is connected generally to the nearest switching office by means of a dedicated pair of wires known as subscriber loop.. It is easier to lay cable[r] ...

16

TR 176 pdf

TR 176 pdf

... the line to the fastest speed it can achieve (given line-length and local noise ...actual line- rate. The BNG can have visibility of the end-user’s actual DSL line rate via either the PPPoE ...

27

DEFINITY AUDIX System Digital Networking

DEFINITY AUDIX System Digital Networking

... Part 15: Class A Statement. This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide rea- sonable ...

236

Digital Single Line Telephone User Guide

Digital Single Line Telephone User Guide

... After reaching a busy outside number, you can activate ABR so that the Strata DK system automatically redials the number at regular intervals. If the system redials an outside number that is still busy, ABR resets and ...

60

Index of /Manuals/NEC

Index of /Manuals/NEC

... You can restrict a subscriber from changing message delivery settings by adding A to the Access field on the subscriber Personal Directory page. This keeps the s[r] ...

423

Subscriber churn in the Australian ISP market

Subscriber churn in the Australian ISP market

... Some extensions of this study may prove beneficial. It would be useful to develop questions which would educe the magnitude of price reductions required for a subscriber to churn from an ISP. Consideration of the ...

14

Throughput Analysis in an Infrastructure-based Mesh Network using BeeHive Algorithm

Throughput Analysis in an Infrastructure-based Mesh Network using BeeHive Algorithm

... 4.2.4 Speed of mobility of the mobile nodes. Higher the speed of mobility, faster the nodes move out of the foraging regions, which in turn requires the foraging regions to be re-formed at shorter intervals. An analysis ...

9

A Study Report on Authentication Protocols in GSM, GPRS and UMTS

A Study Report on Authentication Protocols in GSM, GPRS and UMTS

... Services Digital Network (ISDN) and Public Switch Telephone Network (PSTN) ...contains Subscriber Identity Module (SIM) consists the services like Authentication key Ki, International Mobile ...

7

Show all 10000 documents...

Related subjects