Discuss different mode of centralized stored program control, Computer Engineering

Assignment Help:

Explain SPC. Also discuss the different modes of Centralized SPC

In stored program control systems, set of instructions or a program to the computer is stored into its memory and instructions are executed automatically one by one through the processor. Continuing the exchange control functions by programs stored in the memory of a computer led to that name. Now there are two approaches to organizing stored program control are given below:

1. Centralized: In this type control, all the control equipment is replaced with a single processor that must be fairly powerful.

2. Distributed: In such controlling, the control functions are shared through many processors within the exchange itself.

Dual processor architecture may be configured in centralized SPC to operate in one of three modes which are given below:

a. Standby mode: In this, one processor is active and another is on standby, both software and hardware wise. This standby processor brought online while active processor fails. Significant requirement of this configuration is the capability of the standby processor to reconstitute the state of the exchange system, while this takes over the control.

b. Synchronous duplex mode: In this mode, hardware coupling is given between the two processors that execute similar set of instructions and compare the results continuously. When a mismatch arises, the faculty processor is specified and taken out of service instantly. If the system is operating generally, the two processors have similar data in their memories at all the time and receive all information from the exchange environment.

c. Load sharing mode: In this operation, an incoming call is allocated randomly or into a predetermined order to one of the processors that after this handles the call right by completion. Therefore both the processors are active concurrently and share the resources and the load dynamically.


Related Discussions:- Discuss different mode of centralized stored program control

Explain about barrier, Q. Explain about Barrier? Barrier: No actual tra...

Q. Explain about Barrier? Barrier: No actual transfer of data takes place in this mode unless all the processors involved in the communication execute a particular block, calle

Compare a decoder and a demultiplexer with block diagram, Compare a decoder...

Compare a decoder and a demultiplexer with suitable block diagrams. Ans. Demultiplexer has similar circuit as decoder but here e is obtained as the particular input line, the

Explain cause effect graphing, Explain cause effect graphing . Cause-ef...

Explain cause effect graphing . Cause-effect graphing is a test case design method that gives a concise representation of logical conditions and corresponding actions.  The

Explain about olap, OLAP is called as online analytical processing which gi...

OLAP is called as online analytical processing which gives answers to queries which are multi dimensional in nature. It composes relational reporting and data mining for giving sol

Concept of mouse, The concept of Mouse was designed by Douglas C. Engelbart...

The concept of Mouse was designed by Douglas C. Engelbart of Stanford Research institute and first Mouse was designed by Xerox corporation.  Mouse itself is a device that gives you

Describe clusters in cellular systems, Question: a) With the help of a...

Question: a) With the help of a diagram, describe clusters in cellular systems. b) Describe the role of the following components in the GSM architecture Radio Sub-Sy

Intelligent retrieval from database, Intelligent Retrieval from Database: D...

Intelligent Retrieval from Database: Database system are large bodies of facts about some subjects, which are used to answer users queries about that subject. The design of d

Linux, Explain about unix file system architecture

Explain about unix file system architecture

Convert the following binary numbers into hexadecimal, Q. Convert the follo...

Q. Convert the following BINARY numbers into HEXADECIMAL, double check by converting the result HEXADECIMAL to BINARY. a) 1101.0110 b) 1011.11010 c) 11110.01011

Reprographic methods for information distribution, Reprographic Methods ...

Reprographic Methods i) Thermography ii) Dyeline jii) Microfiche iv) Fax In this unit you have learnt that: Used for Methods of reprography are used for the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd