Asynchronous or statistical time division multiplexing, Computer Networking

Assignment Help:

Asynchronous or Statistical Time Division Multiplexing

As we  have seen  synchronous  TDM does not  guarantee that the full capacity of a link in sued. In fact it is more likely  that only  a portion of the  time slots are in use at a given  instant. Because  the time  slots  are reassigned and  fixed whenever a connected device is not  transmitting, the  corresponding  slot is empty and that much   capacity of the path  is wasted. For  example imagine that we have multiplexed the output of 20 identical computer onto a single line. Suing synchronous TDM the speed  of that line must be at  least 20 times the speed of each input line. But  what  if only 10 computers  are in use at a time ? half of the capacity  of the line  is wasted.

Statistical  time  division  multiplexing is designed to avoid this type of waste. As with  the term  synchronous. The term  asynchronous means some  things   different  in multiplexing  that it  means  in other  areas of data communications. Here it  flexible  or not  fixed.

Like synchronous TDM asynchronous TDM allows  a number of lower  speed  input  lines  to be  multiplexed  to a single  higher speed  line. Unlike  synchronous  TDM however in asynchronous TDM the total  speed of the input  can be greater than  the capacity  of the path. In a synchronous systems if we have in  input  lines. The frame contains a fixed number of a least m time  slots. In  an asynchronous systems. If  we have  n input line the  frame contains no more  than  m slots with m less than n. In  this way asynchronous TDM supports  the same  number of input lines as synchronous TDM with a lower capacity  link or given the same  link. Asynchronous TDM can support more  devices  than  synchronous TDM.

1558_Asynchronous or Statistical Time Division Multiplexing.gif

figure Asynchronous TDM

The number  of time  slots in an asynchronous TDM fame is based on a statistical analysis of the number  of input lines that are likely to be transmitting at any given  time. Rather than being reassigned each slot  is available to any  of the attached input lines  that has data  to seen. The  multiplexer scans the input lines accept portions of data until a frame is felled and then sends the frame across the link. If  there are not enough data to  fill all the  slot s in a frame the frame a transmitted only partially filled thus full link capacity  may not be used 100 percent   of the time. But  the ability to allocate time slots  dynamically coupled with  the lower  ration of the slots  to input  greatly reduces the likelihood and degree  of waste.

 

 


Related Discussions:- Asynchronous or statistical time division multiplexing

What are the advantages of adaptive routing, What are the Advantages of ada...

What are the Advantages of adaptive routing  (1) An adaptive routing method can improve performance, as realised by the network user. (2) An adaptive routing method can aid

Tcp, how tcp is redefined for wireless network

how tcp is redefined for wireless network

Matrix computation and multiplication, In the following section, we shall d...

In the following section, we shall discuss the algorithms for solving the matrix multiplication difficulty using the parallel models. Matrix Multiplication Problem Let ther

Determine the application areas of intranet, Determine the Application area...

Determine the Application areas of intranet The uses of an Intranet are only limited by imagination. Some of the larger sectors where the Intranet can be easily and success fu

WAN, what is a WAN

what is a WAN

What are netbios and netbeui, What are NETBIOS and NETBEUI? NETBIOS is ...

What are NETBIOS and NETBEUI? NETBIOS is a programming interface that permits I/O requests to be sent to and received from a remote computer and it hides the networking hardwar

Describe network topology and vpn, Describe Network Topology and VPN Ne...

Describe Network Topology and VPN Network Topology refers to the layout of a computer network. It presents how devices and cables are physically laid out, as well as how they j

Components of the vpn - point to point , Components of the VPN When  us...

Components of the VPN When  using  VPN we incorporate many pieces of a jigsaw puzzle each piece services its own  function to private  the interoperation and the  security  nec

Approaches use in constructing application entities, The diagram below offe...

The diagram below offers an overall view on the methods use by both the OSI and TCP/IP model. ISO Approach - Occasionally called Horizontal Approach - OSI asse

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd