Maximum utilisation of the corporate intranet link

Assignment Help Computer Engineering
Reference no: EM1379134

The Problem

You have been given the job of choosing an admission policy for an ATM multiplexer which has been retrofitted to a local exchange. The multiplexer output is an ATM stream at the STM-16 rate (2.48832 Gb/s). It features two distinct sets of inputs. The first set comprises 6400 voice inputs - these are 32 kb/s ADPCM circuits which are individually mapped into ATM VCs using AAL1. The second set comprises a single IP link, operating at the OC-48 rate, on which is multiplexed all the IP traffic from a corporate intranet. The mux uses AAL5 to convert the incoming IP frames to ATM cells prior to multiplexing.

The mux features a FCFS (First Come First Served) buffer service discipline.

During the busy hour, the mean holding time (i.e., duration) of each voice call is 600 s. Holding times are exponentially distributed. The mean proportion of the number of voice circuits which are busy during the busy hour is 50%. All voice calls are accepted by the mux.

You may assume that the lengths of the IP frames from the corporate intranet are exponentially distributed, with a mean length of 1000 bytes, and that the interarrival time between frames is also exponentially distributed. (You increase the load from the intranet, using this traffic model, by reducing the mean interarrival time). You may (for simplicity) assume that the transmission of ATM cells or IP frames on the various links in the system incurs no overhead due to packet encapsulation at lower levels of the stack or due to the transmission of any "housekeeping" messages. Thus you can assume that the usable bitrate on the STM-16 output link is the full 2.48832 Gb/s, and not say 2.405376 Gb/s (the usable rate after allowing for SDH overhead).

Determine the maximum utilisation of the corporate intranet link which can be permitted if the mean delay through the mux for voice calls is to be kept below 11.755 ms during the busy hour.

Describe carefully any assumptions you make about the internal operation of the mux.

Reference no: EM1379134

Questions Cloud

Principles of a profit-oriented entrepreneurial approach : Determine what three resources or tools available through the Small Business Administration and SCORE would be the most useful to the type of business and entrepreneurial approach you identified with. Explain your reasons.
Asymmetric encryption algorithm : Discuss and explain how the asymmetric encryption algorithm can be used to achieve the following targets:
Program of law of total probability : Think about a system that generates ten million audit records every day. Also suppose that there are on average 10 attacks per day on this system and that each such attack is reflected in twenty records.
Design several security awareness posters : With the help of graphics program, design many security awareness posters on the following themes, updating antivirus signatures, watching out for e-mail viruses.
Maximum utilisation of the corporate intranet link : Determine the maximum utilisation of the corporate intranet link which can be permitted if the mean delay through the mux for voice calls is to be kept below 11.755 ms during the busy hour.
Creating er diagram : Construct a table for consumer. The manager tells me that this table needs to track the following data: all consumers' social security number, first and last name, address, city,
Java program editing : Prompt the user for the student's score and put that value into an object
Finding java code error : Indicate in the given code segment if an error occurs. If so, point to whether it is syntax, runtime or logic and how you would fix it.
Write the bubble sort : The village of Marengo conducted a census and collected records that have household data, including the number of occupants in each household.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Give difference between standard forms, mdi parent forms

define the difference between standard forms, MDI parent forms, and MDI child forms in an MDI application. How is each type of form created? Give examples of when to use each type of form.

  Program on wireless connection technology

Program on wireless connection technology.

  Which array types can hold object references

What is the default initialization value for a integer array.

  Determining the companys checkbook or ledger

The subcontractor says that original check was for only $10,750. Jonathan looks around office however was not able to determine the company checkbook or ledger.

  Give an the output of program

What is an output of this Java program.

  What is the concurrency control and what is its objective

What is the role of a database management system (DBMS) and what are its benefits.

  Ethical dialectical process of thinking state

Ethical Dialectical Process of Thinking state

  Explain how is visual basic .net different

Search for information about .NET. What is it? Read articles on Visual Basic .NET. Why do you think students should learn Visual Basic .NET? How would it be useful for students?

  Purpose of the open systems interconnection

explain when and why the International Standards Organization developed the OSI model.

  Mutual authentication and key establishment protocol

Assume a server-assisted mutual authentication and key establishment protocol. Suppose that Alice and the Server share the pairwise symmetric key KAS; however Bob and Server share a pairwise symmetric key KBS.

  What is standard purchasing system

SPS system would standardize purchasing practices for each Snad and Surf subsidiary and manage all purchasing information. System testing will be completed by end of the week. What kinds of documentation are required for this application?

  Write a program that accepts data continuously

Write a program that accepts data continuously

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd