Front End Processor
Front End Processor (FEP)
A front end
processor (FEP), or a communications processor, is a
small-sized computer which interfaces to the host computer a number of networks, such as SNA, or a number of peripheral
devices,
such as terminals, disk units, printers and tape units. Data is transferred between the host computer and
the front end processor using a high-speed parallel interface. The front end processor communicates with
peripheral devices using slower serial
interfaces,
usually also through communication networks. The purpose is to off-load from
the host computer the work of managing the peripheral devices, transmitting and
receiving messages, packet assembly and disassembly, error detection, and error
correction.[1] Two examples are the IBM 3705 Communications Controller and the Burroughs Data Communications Processor.
MORE BLOGS AT:- https://darkwriter17.blogspot.com
MORE BLOGS AT:- https://darkwriter17.blogspot.com
Sometimes FEP is
synonymous with a communications controller, although the latter is
not necessarily as flexible. Early communications controllers such as the IBM 270x series were hard wired, but later units were programmable devices.
Front end processor
is also used in a more general sense in asymmetric multi-processor systems. The
FEP is a processing device (usually a computer) which is closer to the input
source than is the main processor. It performs some task such as telemetry control, data collection, reduction of raw sensor data,
analysis of keyboard input, etc.
Front-end processes
relates to the software interface between the user (client) and the application processes (server) in the client/server architecture. The user enters input
(data) into the front-end process where it is collected and processed in such a
way that it conforms to what the receiving application (back end) on the server
can accept and process. As an example, the user enters a URL into a GUI (front-end process) such as Microsoft Internet
Explorer. The GUI then processes the URL in such a way that the user is able to
reach or access the intended web pages on the web server (application server
known as the “back end” process). Front-end processors or communications
processors relates to efficient use of the host CPU by off-loading processing
for peripheral control, as an example, to another device or controller.[2]
Repeater –
A repeater operates at the physical layer. Its job is to regenerate the signal
over the same network before the signal becomes too weak or corrupted so as to
extend the length to which the signal can be transmitted over the same network.
An important point to be noted about repeaters is that they do not amplify the
signal. When the signal becomes weak, they copy the signal bit by bit and
regenerate it at the original strength. It is a 2 port device.
MORE BLOGS AT:- https://darkwriter17.blogspot.com
MORE BLOGS AT:- https://darkwriter17.blogspot.com
Bridge – A bridge operates at data link layer. A
bridge is a repeater, with add on the functionality of filtering content by
reading the MAC addresses of source and destination. It is also used for
interconnecting two LANs working on the same protocol. It has a single input
and single output port, thus making it a 2 port device.
Types of Bridges
·
Transparent
Bridges:- These
are the bridge in which the stations are completely unaware of the
bridge’s existence i.e. whether or not a bridge is added or deleted from the network, reconfiguration of
the stations is unnecessary. These bridges make use of two processes i.e. bridge forwarding and bridge learning.
bridge’s existence i.e. whether or not a bridge is added or deleted from the network, reconfiguration of
the stations is unnecessary. These bridges make use of two processes i.e. bridge forwarding and bridge learning.
·
Source
Routing Bridges:- In
these bridges, routing operation is performed by source station and the frame
specifies which route to follow. The hot can discover frame by sending a
special frame called discovery frame, which spreads through the entire network
using all possible paths to destination.
Gateway –
A gateway, as the name suggests, is a passage to connect two networks together
that may work upon different networking models. They basically work as the
messenger agents that take data from one system, interpret it, and transfer it
to another system. Gateways are also called protocol converters and can operate
at any network layer. Gateways are generally more complex than switch or
router.
Hub – A hub
is basically a multiport repeater. A hub connects multiple wires coming
from different branches, for example, the connector in star topology which
connects different stations. Hubs cannot filter data, so data packets are sent
to all connected devices. In other words, collision domain of
all hosts connected through Hub remains one. Also, they do not have
intelligence to find out best path for data packets which leads to
inefficiencies and wastage.
Types of Hub
·
Active
Hub:- These
are the hubs which have their own power supply and can clean, boost and relay
the signal along with the network. It serves both as a repeater as well as
wiring centre. These are used to extend the maximum distance between nodes.
·
Passive
Hub :- These
are the hubs which collect wiring from nodes and power supply from active hub.
These hubs relay signals onto the network without cleaning and boosting them
and can’t be used to extend the distance between nodes.
TOKEN PASSING
On a local area network, token passing is a channel access method where a signal called a token is passed
between nodes to authorize that node to communicate.[1][2][3] In contrast to polling access methods, there is no pre-defined "master"
node.[4] The most well-known examples are token ring and ARCNET, but there were a range of others, including FDDI (Fiber Distributed Data Interface), which was popular in
the early to mid 1990s.
Token passing schemes degrade deterministically
under load, which is a key reason why they were popular for industrial control
LANs such as MAP, (Manufacturing Automation Protocol).[5] The advantage over contention based channel access (such as the CSMA/CD of early Ethernet), is that collisions are eliminated, and
that the channel bandwidth can
be fully utilized without idle time when demand is heavy.[6] The disadvantage is that even when demand is light, a
station wishing to transmit must wait for the token, increasing latency.
MORE BLOGS AT:- https://darkwriter17.blogspot.com
MORE BLOGS AT:- https://darkwriter17.blogspot.com
Some types of token passing schemes do not need to explicitly send a token between systems because the process of "passing the token" is implicit. An example is the channel access method used during "Contention Free Time Slots" in the ITU-T G.hn standard for high-speed local area networking using existing home wires (power lines, phone lines and coaxial cable).
CSMA/CD
Carrier-sense multiple access with collision
detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are
transmitting. This is used in combination with collision detection in which a
transmitting station detects collisions by sensing transmissions from other
stations while it is transmitting a frame.
When this collision condition is detected, the station stops transmitting that
frame, transmits a jam signal, and then waits for a random time interval before
trying to resend the frame.[1]
CSMA/CD is a modification of pure carrier-sense multiple access (CSMA). CSMA/CD is used to improve CSMA performance by
terminating transmission as soon as a collision is detected, thus shortening
the time required before a retry can be attempted.
With the growing popularity of Ethernet
switches in the
1990s, IEEE 802.3 deprecated Ethernet
repeaters, CSMA/CD, and
half-duplex operation in 2011,[2] rendering CSMA/CD largely obsolete.
CSMA/CD
Carrier-sense multiple access with collision
detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are
transmitting. This is used in combination with collision detection in which a transmitting
station detects collisions by sensing transmissions from other stations while
it is transmitting a frame.
When this collision condition is detected, the station stops transmitting that
frame, transmits a jam signal, and then waits for a random time interval before
trying to resend the frame.[1]
CSMA/CD is a modification of pure carrier-sense multiple access (CSMA). CSMA/CD is used to improve CSMA performance by
terminating transmission as soon as a collision is detected, thus shortening
the time required before a retry can be attempted.
With the growing popularity of Ethernet
switches in the
1990s, IEEE 802.3 deprecated Ethernet
repeaters, CSMA/CD, and
half-duplex operation in 2011,[2] rendering CSMA/CD largely obsolete.
MORE BLOGS AT:- https://darkwriter17.blogspot.com
Comments
Post a Comment