Question

In: Computer Science

Discuss the architecture and technologies that make up the PSTN (Public Switched Telephone Network).

Discuss the architecture and technologies that make up the PSTN (Public Switched Telephone Network).

Solutions

Expert Solution

PSTN(Public Switched Telephone Network): It's the aggregation of circuit-switching telephone networks that has evolved from the days of Alexander Graham Bell .The PSTN actually furnishes much of the Internet's long-distance infrastructure.

The technologies used in PSTN is:

  • Network Topology
  • Digital Channels
  • Impact On IP channels

One important distinction with the public switched telephone network is that it stands in contrast to private exchange networks. Private branch exchanges and other technologies allowed companies and other parties to create more individual telephone lines that were not represented in the PSTN and public landline architecture.

Today, as smartphones and mobile devices continue to proliferate, wireless telecom networks are taking up market share and PSTN landline technology is diminishing.

PSTN it is also called as "pretty standard telephone network," a tongue-in-check expression referring to its slow speed.


Related Solutions

Briefly compare, highlighting the differences, the architecture of the Internet with that of the telephone network.
Briefly compare, highlighting the differences, the architecture of the Internet with that of the telephone network.
Discuss how you will address the challenges of sniffing on a switched network in the testing...
Discuss how you will address the challenges of sniffing on a switched network in the testing process.
1) Define the following concepts: computer network, network architecture, protocol, and multilayer protocol. 2) As an...
1) Define the following concepts: computer network, network architecture, protocol, and multilayer protocol. 2) As an IT professional who works in the networked world describe the professional, social, economic, and cultural issues of computer networks. 3) As an IT professional who works in the networked world describe the ethical issues and your social responsibility.
Network architecture: Categorize each of the following requirements as core/fundamental, feature, or informational. a. Network must...
Network architecture: Categorize each of the following requirements as core/fundamental, feature, or informational. a. Network must support Fiber Optical interface for all devices on the network b. Network backbone should be upgradable in capacity to 10Gb/s within two years of deployment c. Finance department requires firewall protection to the server. d. Existing network consists of 10BaseT Ethernet and FDDI segments. e. Network personnel would like to be able to bill users for network service. f. Network core may generate or...
In packet switched network, store and forward refers to transmitting packet to the next link after...
In packet switched network, store and forward refers to transmitting packet to the next link after entire packet arrives at router scheduling of packet transmission to avoid congestion transmitting packet to the next link while router is receiving the packet    storing entire packet at router until acknowledgment is received Which of the following HTTP methods allows a user to upload an object to a specific path on a Web server? HEAD GET PUT POST Which of the following is NOT...
A number of security devices can be placed at appropriate places in the network architecture to...
A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.
A number of security devices can be placed at appropriate places in the network architecture to...
A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.
A number of security devices can be placed at appropriate places in the network architecture to...
A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.
A number of security devices can be placed at appropriate places in the network architecture to...
A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.
A number of security devices can be placed at appropriate places in the network architecture to...
A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT