Explain the working of any one of centralized spc, Computer Engineering

Assignment Help:

Explain the working of any one of centralized SPC?

Standby mode of operation is the easiest of dual processor configuration operations. Usually, one processor is active and another is on standby, software and hardware both wise. The Standby processor is brought online simply while the active processor fails. A significant requirement of this configuration is the capability of the standby processor to reconstitute the state of the exchange system while this takes over the control, that is to find out which of the subscribers and trunks are free or busy, which of the paths are associated by the switching network and so on. In small exchanges, it may be possible by scanning all the status signals immediately the standby processor is brought in operation. In this a case, only the calls that are being established at the time of failure of the active processor are disturbed. In huge exchanges, this is impossible to scan all the status signals in a reasonable time. Now, the active processor copies the status of the system periodically, as every five seconds, in a secondary storage. While a switch over arise, the online processor loads the latest update of the system status from the secondary storage and carries out the operation. In such case, only the calls that changed status in between the last update and the failure of the active processor are disturbed. Figure demonstrates a standby dual processor configuration along with a common backup storage. The shared secondary storage requires not be duplicated and easy unit level redundancy would suffice.

10_Standby Dual Processor Configuration.png

Standby Dual Processor Configuration

Here, P1 = active storage and P2 = stand by processor

FIG - Standby Dual Processor Configuration.


Related Discussions:- Explain the working of any one of centralized spc

Modus ponens rule, Modus ponens rule: In fact the general format for t...

Modus ponens rule: In fact the general format for the modus ponens rule is as follows: like if we have a true sentence that states the proposition A implies proposition B and

Difference between overlay graph and correlate graph, Overlay Graph: It ove...

Overlay Graph: It overlay the content of two graphs that shares an ordinary x-axis. Left Y-axis on the merged graph show's the present graph's value & Right Y-axis illustrate the v

Explain what are video and graphic in multimedia application, Question: ...

Question: (a) Copying a graphic image from the Web will be as easy as pointing to it and clicking the right mouse button or performing a screen capture. The question is, under

Design a logic circuit, Ask questDesign a logic circuit with 4 inputs A, B,...

Ask questDesign a logic circuit with 4 inputs A, B, C & D that will produce output ‘1’ only whenever two adjacent input variables are 1’s. A & D are also to be treated as adjacent,

Amdahls law - calculate speed up performance, To calculate speed up perform...

To calculate speed up performance various laws have been developed. These laws are discussed here.  Amdahl's Law Remember, the speed up factor helps us in knowing the relat

Address phase timing - computer architecture, Address phase timing: On...

Address phase timing: On the rising edge of clock 0, the initiator notes IRDY # and FRAME# both high, and GNT# low, so it drives the command, address and asserts FRAME# in tim

Draw logic circuit using 2-input NAND gates, A combinational circuit has 3 ...

A combinational circuit has 3 inputs A, B, C and output F.  F is true for following input combinations A is False, B is True A is False, C is True A, B, C

What is an on"*-input filed" statement, What is an on"*-input filed" statem...

What is an on"*-input filed" statement? ON *-INPUT The ABAP/4 module is known as if the user has entered the "*" in the first character of the field, and the field has th

What is the cih, CIH, also known  as Chernobyl or Spacefiller, is a Microso...

CIH, also known  as Chernobyl or Spacefiller, is a Microsoft Windows computer virus which first emerged in 1998. It is one of the most damaging viruses, overwriting critical inform

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd