Home > Articles > Networking > Network Design & Architecture

This chapter is from the book


Multiplexers, often called muxes, are extremely important to telecommunications. Their main reason for being is to reduce network costs by minimizing the number of communications links needed between two points. As with all other computing systems, multiplexers have evolved. Each new generation has additional intelligence, and additional intelligence brings more benefits. The types of benefits that have accrued, for example, include the following:

  • The capability to do data compression so that you can encode certain characters with fewer bits than normally required and free up that additional capacity for the movement of other information.

  • The capability to do error detection and correction between the two points that are being connected to ensure that data integrity and accuracy are being maintained.

  • The capability to manage transmission resources on a dynamic basis, with such things as priority levels. If you have only one 64Kbps channel left, who gets it? Or what happens when the link between San Francisco and Hong Kong goes down? How else can you reroute traffic to get the high-priority information where it needs to go? Multiplexers help solve such problems.

The more intelligent the multiplexer, the more actively and intelligently it can work on your behalf to dynamically make use of the transmission resources you have.

When you're working with network design and telecommunications, you need to consider line cost versus device cost. You can provide extremely high levels of service by ensuring that everybody always has a live and available communications link. But you must pay for those services on an ongoing basis, and their costs become extremely high. You can offset the costs associated with providing large numbers of lines by instead using devices such as multiplexers that help you make more intelligent use of a smaller group of lines.

Figure 2.12 illustrates a network without multiplexers. Let's say this network is for Bob's department stores. The CPU is at Location A, a data center that's in New York that manages all the credit authorization functions for all the Bob's stores. Location B, the San Francisco area, has five different Bob's stores in different locations. Many customers will want to make purchases using their Bob's credit cards, so we need to have a communications link back to the New York credit authorization center so that the proper approvals and validations can be made. Given that it's a sales transaction, the most likely choice of communications link is the use of a leased line from each of the locations in San Francisco back to the main headquarters in New York.

Figure 2.12 A network without multiplexers

Remember that the use of leased lines is a very expensive type of network connection. Because this network resource has been reserved for one company's usage only, nobody else has access to that bandwidth, and providers can't make use of it in the evenings or the weekends to carry residential traffic, so the company pays a premium. Even though it is the most expensive approach to networking, the vast majority of data networking today still takes place using leased lines, because they make the network manager feel very much in control of the network's destiny. With leased lines, the bandwidth is not affected by sudden shifts of traffic elsewhere in the network, the company can apply its own sophisticated network management tools, and the network manager feels a sense of security in knowing who the user communities are at either end of that link. But leased lines have another negative attribute: They are mileage sensitive, so the longer the communications link, the higher the cost. And in a network that doesn't efficiently make use of that communications link all day long, leased lines become overkill and an expensive proposition.

The astute network manager at Bob's tries to think about ways to make the network less expensive. One solution, shown in Figure 2.13, is to put in multiplexers. Multiplexers always come in pairs, so if you have one at one end, you must have one at the other end. They are also symmetrical, so if there are five outputs available in San Francisco, there must also be five inputs in the New York location. The key savings in this scenario comes from using only one leased line between New York and California. In San Francisco, short leased lines, referred to as tail circuits, run from the centrally placed multiplexer to each of the individual locations. Thus, five locations are sharing one high-cost leased line, rather than each having its own leased line. Intelligence embedded in the multiplexers allows the network manager to manage access to that bandwidth and to allocate network services to the endpoints.

Figure 2.13 A network with multiplexers

Various techniques—including Frequency Division Multiplexing (FDM), Time Division Multiplexing (TDM), Statistical Time Division Multiplexing (STDM), intelligent multiplexing, inverse multiplexing, and Wavelength Division Multiplexing (WDM)/Dense Wavelength Division Multiplexing (DWDM)—enable multiple channels to coexist on one link. The following sections examine each of these techniques.


FDM is an environment in which the entire frequency band available on the communications link is divided into smaller individual bands or channels (see Figure 2.14). Each user is assigned to a different frequency. The signals all travel in parallel over the same communications link, but they are divided by frequency—that is, each signal rides on a different portion of the frequency spectrum. Frequency, which is an analog parameter, implies that the type of link you see with FDM is usually an analog facility. A disadvantage of frequency division muxes is that they can be difficult to reconfigure in an environment in which there's a great deal of dynamic change. For instance, to increase the capacity of Channel 1 in Figure 2.14, you would also have to tweak Channels 2, 3, and 4 to accommodate that change.

Figure 2.14 FDM

If an enterprise has a high degree of moves, additions, and changes, FDM would be an expensive system to maintain because it would require the additional expertise of frequency engineering and reconfiguration. Given the environment today, we don't make great use of FDM, but it is still used extensively in cable TV and in radio. In cable TV, multiple channels of programming all coexist on the coax coming into your home, and they are separated based on the frequency band in which they travel. When you enter a channel number on your set-top box or cable-ready TV, you're essentially indicating to the network what portion of the frequency band it's traveling on.


The second muxing technique to be delivered to the marketplace was TDM. There are various levels of TDM. In the plain-vanilla TDM model, as shown in Figure 2.15, a dedicated time slot is provided for each port or point of interface on the system. Each device in a predetermined sequence is allotted a time slot during which it can transmit. That time slot would enable one character of data, or 8 bits of digitized voice, to be placed on the communications link. The allocated time slots have to be framed in order for the individual channels to be separated out. A problem with a standard time-division mux is that there is a one-to-one correlation between each port and time slot, so if the device attached to Port 2 is out for the day, nobody else can make use of Time Slot 2. Hence, there is a tendency to waste bandwidth when vacant slots occur because of idle stations. However, this type of TDM is more efficient than standard FDM because more subchannels can be derived.

Figure 2.15 TDM

FDM and TDM can be combined. For example, you could use FDM to carve out individual channels and then within each of those channels apply TDM to carry multiple conversations on each channel. In fact, this is the way that some digital cellular systems work (for example, Global Systems for Mobile Communications [GSM]). Digital cellular systems are discussed in Chapter 14, "Wireless Communications."


STDM was introduced to overcome the limitation of standard TDM, in which stations cannot use each other's time slots. Statistical time-division multiplexers, sometimes called statistical muxes or stat muxes, dynamically allocate the time slots among the active terminals, which means that you can actually have more terminals than you have time slots (see Figure 2.16).

Figure 2.16 STDM

A stat mux is a smarter mux and it has more memory than other muxes, so if all the time slots are busy, excess data goes into a buffer. If the buffer fills up, the additional access data gets lost, so it's important to think about how much traffic to put through the stat mux to ensure that performance variables are maintained. By dynamically allocating the time slots, you get the most efficient use of bandwidth. Additionally, because these are smarter muxes, they have the additional intelligence mentioned earlier in terms of compression and error-control features. Because of the dynamic allocation of time slots, a stat mux is able to carry two to five times more traffic than a traditional time-division mux. But, again, as you load the stat mux with traffic, you run the risk of delays and data loss occurring.

Stat muxes are extremely important because they are the basis on which packet-switching technologies (for example, X.25, IP, Frame Relay, ATM) are built. The main benefit of a stat mux is the efficient use of bandwidth, which leads to transmission efficiencies.

Intelligent Multiplexing

An intelligent multiplexer is often referred to as a concentrator, particularly in the telecom world. Rather than being a device used in pairs, it is used as a singular device, a line-sharing device whose purpose is to concentrate large numbers of low-speed lines to be carried over a high-speed line to a further point in the network. A good example of a concentrator is in a device called the digital loop carrier (DLC), which is also referred to as a remote concentrator or remote terminal. In Figure 2.17, twisted-pairs go from the local exchange to the neighborhood. Before the advent of DLCs, you needed a twisted-pair for each household. If the demand increased beyond the number of pairs you had available out of that local exchange, you were out of luck until a new local exchange was added.

Figure 2.17 Intelligent multiplexing: Concentrators

With digital technology, you can make better use of the existing pairs. Instead of using each pair individually per subscriber from the local exchange to the subscriber, you can put a DLC in the center. You use a series of either fiber-optic pairs or microwave beams to connect the local exchange to this intermediate DLC, and those facilities then carry multiplexed traffic. When you get to the DLC, you break out the individual twisted-pairs to the household. This allows you to eliminate much of what used to be an analog plant leading up to the local exchange. It also allows you to provide service to customers who are outside the distance specifications between a subscriber and the local exchange. So, in effect, that DLC can be used to reduce the loop length.

Traditional DLCs are not interoperable with some of the new DSL offerings, including ADSL and SDSL. For example, about 30% to 40% of the U.S. population is serviced through DLCs. And in general, globally, the more rural or remote a city or neighborhood, the more likely that it is serviced via a DLC. For those people to be able to subscribe to the new high-bandwidth DSL services, the carrier will have to replace the DLC with a newer generation of device. Lucent's xDSL Access Gateway, for example, is such a device; it offers a multiservice access system that provides Lite and full-rate ADSL, Integrated Services Digital Network (ISDN), Asynchronous Transfer Mode (ATM), and plain old telephone service (POTS)/analog over twisted-pair lines or fiber. Or, the carrier may simply determine that the market area doesn't promise enough revenue and leave cable modems or broadband wireless as the only available broadband access technique. But the nature of a concentrator is that it enables you to aggregate numerous low-speed residential lines and to multiplex them onto high-bandwidth facilities to pass off to the local exchange.

Inverse Multiplexing

The inverse multiplexer arrived on the scene in the 1990s. It does the opposite of what the multiplexers described so far do. Rather than combine lots of low-bit-rate streams to ride over a high-bit-rate pipe, an inverse multiplexer breaks down a high-bandwidth signal into a group of smaller-data-rate signals that can be dispersed over a range of channels to be carried over the network. A primary application for inverse multiplexers is to support of high-bandwidth applications such as videoconferencing.

In Figure 2.18, a videoconference is to occur at 1.5Mbps. For a good-quality,

or PRI ISDN. (PRI ISDN is discussed in Chapter 3, "Transmission Media: Characteristics and Applications.") The channels are carried across the network separately. At the destination point, a complementary inverse mux again reaggregates, resynchronizes, and reproduces that high-bandwidth signal so that it can be projected on the destination video monitor.

Figure 2.18 Inverse multiplexing

Inverse multiplexing therefore allows you to experience a bit of elastic bandwidth. You can allocate existing capacity to a high-bandwidth application without having to subscribe to a separate link just for that purpose.


WDM was specifically developed for use with fiber optics. In the past, we could use only a fraction of the available bandwidth of a fiber-optic system. This was mainly because we had to convert the optical pulses into electrical signals to regenerate them as they moved through the fiber network. And because repeaters were originally electronic, data rates were limited to about 2.5Gbps. In 1994, something very important happened: optical amplifiers called erbium-doped fiber amplifiers (EDFAs) were introduced. Erbium is a chemical that's injected into the fiber. As a light pulse passes through the erbium, the light is amplified and continues on its merry way, without having to be stopped and processed as an electrical signal. The introduction of EDFAs immediately opened up the opportunity to make use of fiber-optic systems operating at 10Gbps.

EDFAs also paved the way to developing wavelength division multiplexers. Before the advent of WDM, we were using only one wavelength of light within each fiber, whereas the visible light spectrum engages a large number of different wavelengths. WDM takes advantage of the fact that multiple colors or frequencies of light can be transmitted simultaneously down a single optical fiber. The data rate that's supported by each of the wavelengths depends on the type of light source. Today, we have light sources that operate at a rate of OC-48, which is shorthand for 2.5Gbps. We have light sources that operate at OC-192, which is equivalent to 10Gbps. And there are systems in trial that operate at OC-768, offering 40Gbps per wavelength. In the future, we'll go beyond that. Part of the evolution of WDM is that every year we double the number of bits per second that can be carried on a wavelength, and every year we double the number of wavelengths that can be carried over a single fiber. But we have just begun. Soon light sources should be able to pulse in the terabits per second range, and in five years, light sources should pulse in the petabits per second (1,000Tbps) range.

One thing to clarify about the first use of WDM is that unlike with the other types of multiplexing, where the goal is to aggregate smaller channels into one larger channel, WDM is meant to furnish separate channels for each service, at the full data rate. Increasingly, enterprises are making use of new high-capacity switches and routers that are equipped with 2.5Gbps interfaces, so there's a great deal of desire within the user community to be able to plug in to a channel of sufficient size to carry that high-bandwidth signal end-to-end, without having to break it down into smaller increments only to build them back out at the destination.

WDM furnishes a separate channel for each service at the full rate; you cannot aggregate smaller channels into one large channel. Systems that support more than 16 wavelengths are referred to as DWDM (see Figure 2.19). Systems at the OC-48

Figure 2.19 WDM and DWDM

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.


Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.


If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.


This site is not directed to children under the age of 13.


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020