Butterfly permutation, Computer Networking

Assignment Help:

Butterfly permutation

This permutation is getting by interchanging the important significant bit in address with smallest significant bit.

                                  2438_Butterfly permutation.png

Ex. Xn-1,    Xn-2,   and X1.X0 = X0   Xn-2 ....... X1   Xn-1

001↔100,         010↔010

011↔110,

An interconnection network stand on this permutation is the butterfly network. A butterfly network is called a blocking network and it does not permit an arbitrary connection of N inputs to N outputs without clash. The butterfly network is customized in Benz network. The Benz network is said to be non-blocking network and it is produced by joining two butterfly networks back to back, in such a way that data flows forward through one and in reverse through the other.


Related Discussions:- Butterfly permutation

CCNA, I WOULD LIKE TO MAKE MY SELF CLEAR WHETHER THIS TYPE OF PROGRAMS ARE ...

I WOULD LIKE TO MAKE MY SELF CLEAR WHETHER THIS TYPE OF PROGRAMS ARE BASED ON COMPLETE SEVER RELATED AND MAINTENANCE OF AN ENTIRE SMALL ENTERPRISE NETWORK.

Standard ip access-list use as test criteria, What does a Standard IP Acces...

What does a Standard IP Access-list use as test criteria Ans) Standard IP access list use only source address.

Cdma gsm back haul network, S t d "B" 6.4 m Ku-BAND EARTH STATION (2004) ...

S t d "B" 6.4 m Ku-BAND EARTH STATION (2004)   D-Sat (District Satellite Project) circuits for rural connectivity via satellite are in operation. Purpose of this project i

What is a link, What is a Link? A link refers to the connectivity among...

What is a Link? A link refers to the connectivity among two devices. It contains the type of cables and protocols used in order for single device to be able to communicate with

What is a pseudo TTY, What is a pseudo tty? A pseudo tty or false termi...

What is a pseudo tty? A pseudo tty or false terminal enables external machines to connect by Telnet or rlogin. Without a pseudo tty, no connection can take place.

What is meant by asymmetrical protocols, What is meant by Asymmetrical prot...

What is meant by Asymmetrical protocols? There is a many-to-one relationship among clients and server. Clients always initiate the dialog by requesting a service. Servers are p

Describe essential security services, Problem: (a) Application Layer pr...

Problem: (a) Application Layer protocols can be classified as connection-oriented or connectionless-oriented. i. What do you understand by the term protocol? ii. Give an e

What are the brigdes, Brigdes Introduction - LAN may require to cove...

Brigdes Introduction - LAN may require to cover more distance than the media can handle effectively or - Number of stations may perhaps be too great for efficient frame d

Describe in detail with example how data fragmentation works, Describe in d...

Describe in detail with example how data fragmentation works?

Definition of csma/cd, Definition of CSMA/CD CSMA/CD (Carrier Sense Mu...

Definition of CSMA/CD CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is used to minimize collisions, coordinate traffic and maximize number of frames deliver

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd