Describe how the processor computes the tag

Assignment Help Basic Computer Science
Reference no: EM131051230

The Omega network shown in Figure F.11 on page F-31 consists of three columns of four switches, each with two inputs and two outputs. Each switch can be set to straight, which connects the upper switch input to the upper switch output and the lower input to the lower output, and to exchange, which connects the upper input to the lower output and vice versa for the lower input. For each column of switches, label the inputs and outputs 0, 1, . . . , 7 from top to bottom, to correspond with the numbering of the processors.

a. When a switch is set to exchange and a message passes through,w hat is the relationship between the label values for the switch input and output used by the message? (Hint Think in terms of operations on the digits of the binary representation of the label number.)

b. Between any two switches in adjacent columns that are connected by a link, what is the relationship between the label of the output connected to the input?

c. Based on your results in parts (a) and (b), design and describe a simple routing scheme for distributed control of the Omega network. A message will carry a routing tag computed by the sending processor. Describe how the processor computes the tag and how each switch can set itself by examining a bit of the routing tag.

Reference no: EM131051230

Questions Cloud

A security with a beta of zero is risk free : The Glass-Steagall act of 1993 separated commercial banking from investment banking. A security with a beta of zero is risk free. If a stock liew above the securities market line, it is overvalued. There is an overwhelming majority of evidence agains..
Planning to factor some of its receivables : Moon Hardware is planning to factor some of its receivables. The cash received will be used to pay for inventory purchases. The factor has indicated that it will require "recourse" on the sold receivables. Explain to the controller of Moon Hardwar..
Present a summary of your recommendations on culture : You are required to present a summary of your recommendations on culture, communication and cultural competence
Basic macroeconomic topic : First find an article that is about a basic macroeconomic topic. The article can be from the internet, newspaper, or a magazine. The topic of the paragraph is what the article is about.
Describe how the processor computes the tag : Based on your results in parts (a) and (b), design and describe a simple routing scheme for distributed control of the Omega network. A message will carry a routing tag computed by the sending processor. Describe how the processor computes the tag..
Federal reserve takes actions that increase risk-free rate : BLW Corporation is considering the terms to be set on the options it plans to issue to its executives. Which of the following actions would decrease the value of the options, other things held constant? The exercise price of the option is increased. ..
Control purchasing and accounts payable : An accounting information system (AIS) must include certain source documents in order to control purchasing and accounts payable. For a manufacturing organization, the best set of documents should include:
Before converging to the industry median growth rate : The Fast-Growth Company recently paid a dividend of $3.20 per share. Analysts expect the dividend to grow at the rate of 28% per year for 3 years, then by 16% for 3 more years, before converging to the industry median growth rate of 7%. The firm’s be..
How long will take you to pay off mortgage after refinancing : The mortgage on your house is 5 years old. It required monthly payments of 1,422, had an original term of 30 years, and had an interest rate of 10% (APR –monthly). What monthly repayments will be required with the new loan? Suppose you are willing to..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Demand-paged environment

Which of the following programming techniques and data structures (in a user-level program) are good for a demand-paged environment, and which are bad? Explain your answer.

  Add an update time button

Add an "update time"  button

  Calculate the hash function of the above

Messages are in the form of a sequence of decimal numbers, M = (a1, a2,..., at). The hash value h is calculated as mod n. Calculate the hash function of the above for M=(189, 632, 900, 722, 349) and n=989.

  Course major and gpa of any students on athletic scholarship

Using the data from the database you created yesterday for me:Extract the First and Last Name, Student ID, Course Major and GPA of any students on athletic scholarship. Sort by Student ID. Produce a report with the data from Step #1 and Use good head..

  Internet shopping cart is an example of which version of web

The Internet shopping cart is an example of which version of the web?

  Application that is widely used across many platforms

Discussion consist of Internet research and analysis by students on the typical uses of Microsoft Excel. Excel 2013 is Microsoft's spreadsheet application that is widely used across many platforms and for many uses, both professionally and per..

  Experiment with computer system measurements

Platform. Pick a Unix-based platform to work on. This might very likely be something like a PC running Linux, but feel free to experiment with whatever system you have access to, e.g., FreeBSD, some old UNIX system like AIX, or even Mac OS X.

  Which design strategy would you recommend

Assume that you are developing a new system for a local real estate agency. The agency wants to keep a database of its own property listing and also wants to have access to the citywide multiple listing service used by all real estate agents Which de..

  Find out who is in charge of your site

Look up your site both by DNS name and by IP network number; for the latter you may have to try an alternative who is server (e.g., who is -h whois.arin.net...). Try princeton.edu and cisco.com as well.

  The techniques in discovering the requirements

What are some of the techniques in discovering the requirements (fact finding) for a system?

  Give the order in which the packets are transmitted

weighted fair queuing with flow 2 having twice as much share as flow 1, and flow 3 having 1.5 times as much share as flow

  How the police department will able to trace the criminals

Does firewall can protect the phishing mails to get entered into the secured environment or the local environment?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd