Asynchronous or statistical time division multiplexing, Computer Networking

Assignment Help:

Asynchronous or Statistical Time Division Multiplexing

As we  have seen  synchronous  TDM does not  guarantee that the full capacity of a link in sued. In fact it is more likely  that only  a portion of the  time slots are in use at a given  instant. Because  the time  slots  are reassigned and  fixed whenever a connected device is not  transmitting, the  corresponding  slot is empty and that much   capacity of the path  is wasted. For  example imagine that we have multiplexed the output of 20 identical computer onto a single line. Suing synchronous TDM the speed  of that line must be at  least 20 times the speed of each input line. But  what  if only 10 computers  are in use at a time ? half of the capacity  of the line  is wasted.

Statistical  time  division  multiplexing is designed to avoid this type of waste. As with  the term  synchronous. The term  asynchronous means some  things   different  in multiplexing  that it  means  in other  areas of data communications. Here it  flexible  or not  fixed.

Like synchronous TDM asynchronous TDM allows  a number of lower  speed  input  lines  to be  multiplexed  to a single  higher speed  line. Unlike  synchronous  TDM however in asynchronous TDM the total  speed of the input  can be greater than  the capacity  of the path. In a synchronous systems if we have in  input  lines. The frame contains a fixed number of a least m time  slots. In  an asynchronous systems. If  we have  n input line the  frame contains no more  than  m slots with m less than n. In  this way asynchronous TDM supports  the same  number of input lines as synchronous TDM with a lower capacity  link or given the same  link. Asynchronous TDM can support more  devices  than  synchronous TDM.

1558_Asynchronous or Statistical Time Division Multiplexing.gif

figure Asynchronous TDM

The number  of time  slots in an asynchronous TDM fame is based on a statistical analysis of the number  of input lines that are likely to be transmitting at any given  time. Rather than being reassigned each slot  is available to any  of the attached input lines  that has data  to seen. The  multiplexer scans the input lines accept portions of data until a frame is felled and then sends the frame across the link. If  there are not enough data to  fill all the  slot s in a frame the frame a transmitted only partially filled thus full link capacity  may not be used 100 percent   of the time. But  the ability to allocate time slots  dynamically coupled with  the lower  ration of the slots  to input  greatly reduces the likelihood and degree  of waste.

 

 


Related Discussions:- Asynchronous or statistical time division multiplexing

Mime the multipurpose internet mail extensions, MIME The Multipurpose Inter...

MIME The Multipurpose Internet Mail Extensions While  the message  headers described in are satisfactory for sending  ordinary  ASCII text they are  not sufficiently Reich for

Distinguish between network devices computers and servers, The School of Co...

The School of Computing is planning to deploy a new network structure to accommodate the following scenario. Please make suggestions on how this LAN can be designed based on the fl

System analysis, explain the appropriateness of economic and behavioral fea...

explain the appropriateness of economic and behavioral feasibility

Network laye - fundamentals of networks , Network Laye The network  la...

Network Laye The network  layer provides  communication  between the multiple networks. Whereas the  data link  layer provides the  communication between  two systems on the s

How lans connected to internet, How LANs connected to Internet. Doublin...

How LANs connected to Internet. Doubling every 18 months means factor of four gains in 3 years. In 9 years, gain is then 43 or 64, which leads to 6.4 billion hosts. My intuitio

Explain the communication channel threats, Q. Explain the Communication Cha...

Q. Explain the Communication Channel Threats? Secrecy Threat - Secrecy is the avoidance of unauthorized information disclosure - Privacy is the guard of individua

TRAFFIC CONGESTION, Can I get help for data analysis on traffic congestion ...

Can I get help for data analysis on traffic congestion using GIS

Dijkstra algorithms - network layer and routing , Dijkstra Algorithms T...

Dijkstra Algorithms To calculate its  routing  table  each router applies an algorithm  called  the dijkstra algorithm to its  state database. The dijkstra algorithm  calculate

Physical configurations sonet sdh , Physical Configurations Transport ...

Physical Configurations Transport signal multiplexer de multiplexer. It either  signal from multiple   sources into a STS singles  or de multiplexes and STS signal  into diffe

Comparing transport for tcp/ip and osi model, Q. Comparing Transport for TC...

Q. Comparing Transport for TCP/IP and osi model? - The features of TCP and UDP defined at TCP/IP Transport Layer correspond to many of the requirements of the OSI Transport Lay

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd