1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandrvk [35]
3 years ago
6

Ten 9600-bps lines are to be multiplexed using TDM. a. Ignoring overhead bits in the TDM frame, what is the total capacity requi

red for synchronous TDM? b. Assuming that we wish to limit average TDM link utilization to 0.8, and assuming that each TDM link is busy 50% of the time, what is the capacity required for statistical TDM?
Computers and Technology
1 answer:
lukranit [14]3 years ago
3 0

Answer:

a.

<u>Given Data :</u>

Data rate of each Line (Channel) = 9600 bps

Total lines need to be multiplexed = 10

<u>Solution:</u>

Total Capacity of Synchronous TDM = Data rate of each line x Total Lines

                                                            =  9600 bps x 10

                                                            = 96,000 bps

                                                            = 96 Kbps

Explanation:

In time division multiplexing, multiple channels (Lines) can transmit data over the medium on different time slots. In synchronous TDM, equal time has been allocated to each channel to transmit their data over the medium. so the total capacity required for 10 lines synchronous TDM is 96Kbps.

Answer:

b.

<u>Given Data:</u>

Data rate for each line (Channel) = 9600 bps

Total lines need to be multiplexed = 10

Average TDM link utilization = 80% = 0.8

Each link busy for the time = 50% = 0.5

<u>Solution:</u>

Capacity of Statistical TDM = data rate x number of Lines x each channel duration/Average utilization of TDM

Capacity of Statistical TDM = 9600 bps x 10 x 0.5/0.8

                                               =60,000 bps

                                               = 60 kbps

Explanation:

In TDM, if we want to limit the capacity of TDM and each channel that need to be multiplexed. we can limit the utilization of the TDM by limiting its transmission time of each channel and also the capacity of TDM.

You might be interested in
The variable 'a' starts with the value 1 The variable 'b' starts with the value 10 The variable 'c' starts with the value 100 Th
Anettt [7]

Answer:

The answer is B = 365

Explanation:

The following variable were initialized:

a = 1

b = 10

c = 100

x = 0

Then we store the value of 'c' times 3 in 'x'

x = 3 * c = 3 * 100 = 300

x = 300

Then we add the value of 'b' times 6 to the value already in 'x'

x = x + 'b' times 6

x = x + (b * 6) = 300 + (10 * 6) = 300 + 60 = 360

x = 360

Then we add the value of 'a' times 5 to the value already in 'x'

x = x + 'a' times 5

x = x + (a * 5) = 360 + (1 * 5) = 360 + 5 = 365

x = 365.

Therefore, the value of 'x' displayed is 365.

4 0
3 years ago
What is the reason of non-deterministic (indeterminate) behavior of concurrent programs?
murzikaleks [220]

Answer: Concurrent programs are the programs that execute at the same point of time. They are simultaneous in nature with other concurrent programs.They are executed with the help of threads  to achieve the concurrency without the issue of scheduling. They are consider long running programs.

The program that has the low execution time compared with all other programs gets executed first.If the case of no progress is seen then another thread is executed.This type of execution gives the non- deterministic situation in which the possibility of leading completion of any particular program cannot be determined.

5 0
3 years ago
ATMs are particularly helpful for people on unusual schedules.<br> a. True<br> b. False
larisa86 [58]
True, because if you need money on the go because you dont know where you are going, so you might need the money.
4 0
3 years ago
Read 2 more answers
You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a d
Alecsey [184]

Answer:

Promiscuous mode

Explanation:

6 0
3 years ago
You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for auth
irakobra [83]

Answer:A RADIUS server provides authentication through a user name and password encrypted with EAP.

Explanation:

7 0
2 years ago
Other questions:
  • Which web browser below is natively available on a major operating system? ie 10 opera firefox chrome?
    12·1 answer
  • To edit the text in a smartart graphic, what must be done first ?
    7·2 answers
  • That is Entrepreneur ? ?<br>​
    8·1 answer
  • Routing connects different network segments and decides where __________are sent to
    7·1 answer
  • Your windows system is used by several people, so you want increase security by requiring users to create passwords that are at
    9·1 answer
  • - Which amongst the following is not a Characteristic of Cloud Computing?
    5·1 answer
  • In online education is intrinsically related to equity. Professionalism Communication Accessibility
    8·2 answers
  • In which of these areas can software engineers specialize?
    10·1 answer
  • What are the two main parts to a VR experience.
    12·1 answer
  • I need help with this question.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!