answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandrvk [35]
2 years ago
6

Ten 9600-bps lines are to be multiplexed using TDM. a. Ignoring overhead bits in the TDM frame, what is the total capacity requi

red for synchronous TDM? b. Assuming that we wish to limit average TDM link utilization to 0.8, and assuming that each TDM link is busy 50% of the time, what is the capacity required for statistical TDM?
Computers and Technology
1 answer:
lukranit [14]2 years ago
3 0

Answer:

a.

<u>Given Data :</u>

Data rate of each Line (Channel) = 9600 bps

Total lines need to be multiplexed = 10

<u>Solution:</u>

Total Capacity of Synchronous TDM = Data rate of each line x Total Lines

                                                            =  9600 bps x 10

                                                            = 96,000 bps

                                                            = 96 Kbps

Explanation:

In time division multiplexing, multiple channels (Lines) can transmit data over the medium on different time slots. In synchronous TDM, equal time has been allocated to each channel to transmit their data over the medium. so the total capacity required for 10 lines synchronous TDM is 96Kbps.

Answer:

b.

<u>Given Data:</u>

Data rate for each line (Channel) = 9600 bps

Total lines need to be multiplexed = 10

Average TDM link utilization = 80% = 0.8

Each link busy for the time = 50% = 0.5

<u>Solution:</u>

Capacity of Statistical TDM = data rate x number of Lines x each channel duration/Average utilization of TDM

Capacity of Statistical TDM = 9600 bps x 10 x 0.5/0.8

                                               =60,000 bps

                                               = 60 kbps

Explanation:

In TDM, if we want to limit the capacity of TDM and each channel that need to be multiplexed. we can limit the utilization of the TDM by limiting its transmission time of each channel and also the capacity of TDM.

You might be interested in
A company is performing an analysis on the computers at its main office. The computers are spaced along a single row. The analys
harina [27]

Answer:

array = input("Enter the list of computer memory: ").split(',')

int_arr = [int(x) for x in array]

segment = int(input("Enter the length of segment to analyze: "))

list_len = len(int_arr)

segList = []

mini = []

for x,i in enumerate(int_arr):

   seg = int_arr[i-1:segment+i-1]

   if len(seg) == segment:

       segList.append(seg)

for x in segList:

   mini.append(min(x))

result = mini.index(min(mini))

print("Segment with the minimum memory is: ",segList[result])

Explanation:

The python program prints out the segment after analysis, with the smallest disk memory space. The code gets the array of computer rows from the user input and segments the array with the number of segment input, then the minimum is compared for all segments in the network.

5 0
2 years ago
When the computer is started, a bootstrap or IPL (Initial Program Load) begins testing the system. Where is this bootstrap progr
aniked [119]

Answer:

The correct answer to the following question will be Option B (ROM).

Explanation:

Bootstrap is the programming which initializes the OS during initialization. The bootstrap loader creates small operator programs that connect and monitor the various computer hardware components.

ROM is Read-only memory, which will be used to hold a computer's start-up commands, also recognized as firmware.

No other method was used to help save system startup. ROM, then, is the right answer.

7 0
2 years ago
"Describe how implementation of a RAID Level 2 system would be beneficial to a university payroll system. In your own words, des
Darina [25.2K]

Answer:

In RAID 2 Hamming Code ECC Each piece of the information word is kept in touch with an information plate drive . Every datum word has its Hamming Code ECC word recorded on ECC circles. On Read, the ECC code confirms the right information or revises the single plate blunders.  

Strike Level 2 is one of the two innately equal mapping and assurance strategies characterized in the Berkeley paper. It has not been broadly sent in the business to a great extent since it requires an extraordinary plate highlights. Since plate creation volumes decides the cost, it is increasingly practical to utilize standard circles for the RAID frameworks.  

Points of interest: "On the fly" it gives information blunder amendment. Amazingly high information move rates is possible.Higher the information move rate required,better the proportion of information circles to ECC plates. Moderately basic controller configuration contrasted with the other RAID levels 3,4 and 5.  

Impediments: Very high proportion of the ECC plates to information circles with littler word sizes - wasteful. Passage level expense are extremely high - and requires exceptionally high exchange rate prerequisite to legitimize. Exchange rate is equivalent to that of the single plate, best case scenario (with shaft synchronization). No business executions can't/not industrially suitable.

4 0
2 years ago
Write a code segment that uses an enhanced for loop to print all elements of words that end with "ing". As an example, if words
nadezda [96]

Answer:

 public static void main(String[] args) {

   String ing[] = {"ten","fading","post","card","thunder","hinge","trailing","batting"};

   for (String i: ing){

     if (i.endsWith("ing")){

       System.out.println(i);

    }

   }

 }

Explanation:

The for-loop cycles through the entire list and the if-statement makes it so that the string is only printed if it ends with "ing"

6 0
2 years ago
JAVA...Write a statement that calls the recursive method backwardsAlphabet() with parameter startingLetter.
scoray [572]

Answer:

RecursiveCalls.backwardsAlphabet(startingLetter);

Explanation:

The statement that is needed is a single-line statement. Since the class RecursiveCalls is already in the same file we can simply use that class and call its function without making a new class object. Once we call that class' function we simply pass the variable startingLetter (which is already provided) as the sole parameter for the function in order for it to run and use the letter 'z' as the starting point.

       RecursiveCalls.backwardsAlphabet(startingLetter);

3 0
1 year ago
Other questions:
  • Two technicians are discussing lung protection in the shop. Technician A says that respiratory-protection devices can prevent yo
    5·2 answers
  • What medium allows for electronic delivery of DTP content without the need for any physical media?
    13·1 answer
  • A technician has been asked to test an inkjet printer purchased 6 months ago that is being pulled from stock and put into use fo
    9·1 answer
  • Which of the following is true with regard to defensive programming? Preconditions should never be visible to callers. Program c
    8·1 answer
  • I need to write a really simple python program to solve this issue. I have most of the program written but, when I run the secon
    8·1 answer
  • The following parts were ordered by someone building a personal computer:
    12·1 answer
  • Print either "Fruit", "Drink", or "Unknown" (followed by a newline) depending on the value of userItem. Print "Unknown" (followe
    13·1 answer
  • Are bpos safe for organisations ? State your views on it
    8·1 answer
  • The web development team is having difficulty connecting by ssh to your local web server, and you notice the proper rule is miss
    8·1 answer
  • Write a while loop that prints userNum divided by 2 (integer division) until reaching 1. Follow each number by a space. Example
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!