Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Asynchronous or Statistical Time Division Multiplexing
As we have seen synchronous TDM does not guarantee that the full capacity of a link in sued. In fact it is more likely that only a portion of the time slots are in use at a given instant. Because the time slots are reassigned and fixed whenever a connected device is not transmitting, the corresponding slot is empty and that much capacity of the path is wasted. For example imagine that we have multiplexed the output of 20 identical computer onto a single line. Suing synchronous TDM the speed of that line must be at least 20 times the speed of each input line. But what if only 10 computers are in use at a time ? half of the capacity of the line is wasted.
Statistical time division multiplexing is designed to avoid this type of waste. As with the term synchronous. The term asynchronous means some things different in multiplexing that it means in other areas of data communications. Here it flexible or not fixed.
Like synchronous TDM asynchronous TDM allows a number of lower speed input lines to be multiplexed to a single higher speed line. Unlike synchronous TDM however in asynchronous TDM the total speed of the input can be greater than the capacity of the path. In a synchronous systems if we have in input lines. The frame contains a fixed number of a least m time slots. In an asynchronous systems. If we have n input line the frame contains no more than m slots with m less than n. In this way asynchronous TDM supports the same number of input lines as synchronous TDM with a lower capacity link or given the same link. Asynchronous TDM can support more devices than synchronous TDM.
figure Asynchronous TDM
The number of time slots in an asynchronous TDM fame is based on a statistical analysis of the number of input lines that are likely to be transmitting at any given time. Rather than being reassigned each slot is available to any of the attached input lines that has data to seen. The multiplexer scans the input lines accept portions of data until a frame is felled and then sends the frame across the link. If there are not enough data to fill all the slot s in a frame the frame a transmitted only partially filled thus full link capacity may not be used 100 percent of the time. But the ability to allocate time slots dynamically coupled with the lower ration of the slots to input greatly reduces the likelihood and degree of waste.
Synchronization Multiple processors need synchronization with each other while implementing a parallel algorithm. That is, the task running on processor X might have to wait fo
Question: a) Consider the following MIP scenario. Quite a few enterprise networks use private addresses and NAPT for the communication to the Internet. i. Discu
What are the benefits of wireless devices One benefit is that if everyone uses standard, everyone can talk to anyone. Another benefit is that extensive use of any standard will
What are the popular topologies other than basic Topologies? Apart from basic topologies some other topologies worth considering are: mesh topology (each device linked to all o
Write the Generic Name of the OSI Layer a) The figures below illustrate, side by side, the OSI 7-layer reference model and the Internet protocol stack. Inside each box represen
Consider a subnet with subnet prefix 101.101.101/24 a) If you subdivide the subnet into four equal size subnets, what are their prefixes? Give all four prefixes in the form a.
COMPUTER NETWORKS 1. What do you mean by open system? What is the purpose of OSI model? Explain the layered architecture of OSI model. 2. Define the following terms: a) Ana
Each link layer process will have two connections: one "up" to the appropriate IP layer process, and one "sideways" to the link layer process on the simulated machine at the other
What is a Database Server? With a database server, the client passes SQL requests as messages to the database server. The results of every SQL command are returned over the net
Q. Describe Mail Access Protocols? Mail Access Protocols - Used by receiver to retrieve mail when desired - Post Office Protocol, version 3 (POP3) is a simple limited
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd