Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain the working of any one of centralized SPC?
Standby mode of operation is the easiest of dual processor configuration operations. Usually, one processor is active and another is on standby, software and hardware both wise. The Standby processor is brought online simply while the active processor fails. A significant requirement of this configuration is the capability of the standby processor to reconstitute the state of the exchange system while this takes over the control, that is to find out which of the subscribers and trunks are free or busy, which of the paths are associated by the switching network and so on. In small exchanges, it may be possible by scanning all the status signals immediately the standby processor is brought in operation. In this a case, only the calls that are being established at the time of failure of the active processor are disturbed. In huge exchanges, this is impossible to scan all the status signals in a reasonable time. Now, the active processor copies the status of the system periodically, as every five seconds, in a secondary storage. While a switch over arise, the online processor loads the latest update of the system status from the secondary storage and carries out the operation. In such case, only the calls that changed status in between the last update and the failure of the active processor are disturbed. Figure demonstrates a standby dual processor configuration along with a common backup storage. The shared secondary storage requires not be duplicated and easy unit level redundancy would suffice.
Standby Dual Processor Configuration
Here, P1 = active storage and P2 = stand by processor
FIG - Standby Dual Processor Configuration.
What are program-invisible registers? Ans: the local and global descriptor tables are found in the memory system. To access and specify the address of these tables, program inv
Polymorphism in C++ is the idea that a base class can be inherited by various classes. A base class pointer can point to its child class and a base class array can store dissimilar
Q. Explain types of Micro-instructions? In general micro-instruction can be classifiedin two general kinds. These are non-branching and branching. After execution of a non-bran
Execute the following functionality using Java & SQL with simple GUI interface: 1. Insert/delete/update an XML document. 2. Insert/delete/update a category. 3. Alloca
In which input data does the algorithm quick sort exhibit its worst-case Behaviour? The Quick Sort method exhibits its worst-case behavior when the input data is " Already Comp
The Internet has emerged as a major worldwide distribution channel for goods, managerial, services, and professional jobs. It has impacted market economics and industry structure,
Vliw Architecture Superscalar architecture was designed to develop the speed of the scalar processor. But it has been realized that it is not easy to execute as we discussed pr
Contain all the cells that your UDF depends on in the argument list. Or enter this as the first statement in your Function: Application.Volatile This will cause the functi
what is the difference between i5 and i7 processor?
processor, computer science
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd