Maximum utilisation of the corporate intranet link

Assignment Help Computer Engineering
Reference no: EM1379134

The Problem

You have been given the job of choosing an admission policy for an ATM multiplexer which has been retrofitted to a local exchange. The multiplexer output is an ATM stream at the STM-16 rate (2.48832 Gb/s). It features two distinct sets of inputs. The first set comprises 6400 voice inputs - these are 32 kb/s ADPCM circuits which are individually mapped into ATM VCs using AAL1. The second set comprises a single IP link, operating at the OC-48 rate, on which is multiplexed all the IP traffic from a corporate intranet. The mux uses AAL5 to convert the incoming IP frames to ATM cells prior to multiplexing.

The mux features a FCFS (First Come First Served) buffer service discipline.

During the busy hour, the mean holding time (i.e., duration) of each voice call is 600 s. Holding times are exponentially distributed. The mean proportion of the number of voice circuits which are busy during the busy hour is 50%. All voice calls are accepted by the mux.

You may assume that the lengths of the IP frames from the corporate intranet are exponentially distributed, with a mean length of 1000 bytes, and that the interarrival time between frames is also exponentially distributed. (You increase the load from the intranet, using this traffic model, by reducing the mean interarrival time). You may (for simplicity) assume that the transmission of ATM cells or IP frames on the various links in the system incurs no overhead due to packet encapsulation at lower levels of the stack or due to the transmission of any "housekeeping" messages. Thus you can assume that the usable bitrate on the STM-16 output link is the full 2.48832 Gb/s, and not say 2.405376 Gb/s (the usable rate after allowing for SDH overhead).

Determine the maximum utilisation of the corporate intranet link which can be permitted if the mean delay through the mux for voice calls is to be kept below 11.755 ms during the busy hour.

Describe carefully any assumptions you make about the internal operation of the mux.

Reference no: EM1379134

Questions Cloud

Principles of a profit-oriented entrepreneurial approach : Determine what three resources or tools available through the Small Business Administration and SCORE would be the most useful to the type of business and entrepreneurial approach you identified with. Explain your reasons.
Asymmetric encryption algorithm : Discuss and explain how the asymmetric encryption algorithm can be used to achieve the following targets:
Program of law of total probability : Think about a system that generates ten million audit records every day. Also suppose that there are on average 10 attacks per day on this system and that each such attack is reflected in twenty records.
Design several security awareness posters : With the help of graphics program, design many security awareness posters on the following themes, updating antivirus signatures, watching out for e-mail viruses.
Maximum utilisation of the corporate intranet link : Determine the maximum utilisation of the corporate intranet link which can be permitted if the mean delay through the mux for voice calls is to be kept below 11.755 ms during the busy hour.
Creating er diagram : Construct a table for consumer. The manager tells me that this table needs to track the following data: all consumers' social security number, first and last name, address, city,
Java program editing : Prompt the user for the student's score and put that value into an object
Finding java code error : Indicate in the given code segment if an error occurs. If so, point to whether it is syntax, runtime or logic and how you would fix it.
Write the bubble sort : The village of Marengo conducted a census and collected records that have household data, including the number of occupants in each household.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd