Asynchronous or statistical time division multiplexing, Computer Networking

Asynchronous or Statistical Time Division Multiplexing

As we  have seen  synchronous  TDM does not  guarantee that the full capacity of a link in sued. In fact it is more likely  that only  a portion of the  time slots are in use at a given  instant. Because  the time  slots  are reassigned and  fixed whenever a connected device is not  transmitting, the  corresponding  slot is empty and that much   capacity of the path  is wasted. For  example imagine that we have multiplexed the output of 20 identical computer onto a single line. Suing synchronous TDM the speed  of that line must be at  least 20 times the speed of each input line. But  what  if only 10 computers  are in use at a time ? half of the capacity  of the line  is wasted.

Statistical  time  division  multiplexing is designed to avoid this type of waste. As with  the term  synchronous. The term  asynchronous means some  things   different  in multiplexing  that it  means  in other  areas of data communications. Here it  flexible  or not  fixed.

Like synchronous TDM asynchronous TDM allows  a number of lower  speed  input  lines  to be  multiplexed  to a single  higher speed  line. Unlike  synchronous  TDM however in asynchronous TDM the total  speed of the input  can be greater than  the capacity  of the path. In a synchronous systems if we have in  input  lines. The frame contains a fixed number of a least m time  slots. In  an asynchronous systems. If  we have  n input line the  frame contains no more  than  m slots with m less than n. In  this way asynchronous TDM supports  the same  number of input lines as synchronous TDM with a lower capacity  link or given the same  link. Asynchronous TDM can support more  devices  than  synchronous TDM.

1558_Asynchronous or Statistical Time Division Multiplexing.gif

figure Asynchronous TDM

The number  of time  slots in an asynchronous TDM fame is based on a statistical analysis of the number  of input lines that are likely to be transmitting at any given  time. Rather than being reassigned each slot  is available to any  of the attached input lines  that has data  to seen. The  multiplexer scans the input lines accept portions of data until a frame is felled and then sends the frame across the link. If  there are not enough data to  fill all the  slot s in a frame the frame a transmitted only partially filled thus full link capacity  may not be used 100 percent   of the time. But  the ability to allocate time slots  dynamically coupled with  the lower  ration of the slots  to input  greatly reduces the likelihood and degree  of waste.

 

 

Posted Date: 3/2/2013 6:12:48 AM | Location : United States







Related Discussions:- Asynchronous or statistical time division multiplexing, Assignment Help, Ask Question on Asynchronous or statistical time division multiplexing, Get Answer, Expert's Help, Asynchronous or statistical time division multiplexing Discussions

Write discussion on Asynchronous or statistical time division multiplexing
Your posts are moderated
Related Questions
What is the different type of networking / internetworking devices? Repeater: Also called a regenerator, it is an electronic device that operates only at physical layer. I

Random effects are the effects attributable to an infinite set of levels of the factor, of which only the random sample occur in the data. For example, the investigator may want t

Consider the following network example. Suppose that the distance vector (DV) routing algorithm is used to compute the distance between nodes. (a) Show the procedure of nod

a)  Assume that the time required to transmit one packet (i.e. the packet length divided by link data rate) is 10ms and the Round Trip Time (from Source to Destination and back) is

What is the difference between trigger and rule? Ans) The triggers are known as implicitly by database generated events, whereas stored procedures are known as explicitly by cli

The address recorded by a router should be its outgoing interface. That is, if a router forwards a datagram that has the record route option enabled, and if the datagram arrives at

Illustrate the Bellman-Ford algorithm The Bellman-Ford algorithm uses only on information from its neighbours and knowledge of its link costs, to update it costs and paths. Dij

How Does a Firewall Protect Firewalls work by controlling the information that comes in and out of the network. By using the Application Proxy service, the flow of information

Lat take the CONNECT (client side), LISTEN, and ACCEPT (server side) socket primitives a) Why are these three needed for a TCP connection? b) Why are none of them needed for a U

Explain the importance of authentication. Authentication is the method of verifying a user's credentials before he can log into the network. It is normally performed using a us