Concept of permutation network, Computer Networking

Assignment Help:

Concept Of Permutation Network

In permutation interconnection networks the information replace requires data transfer from input set of nodes to output set of nodes and likely connections among edges are established  by  applying  a variety of  permutations  in  available  links.  There  are  a variety of networks where multiple paths from source to destination are feasible.  For finding out what the feasible routes in such networks are the learning of the permutation theory is a must.

Let us see,  the basic concepts of permutation with respect to interconnection network. Let us say the network has place of n input nodes and n output nodes.

Permutation P for a network of 5 nodes (i.e., n = 5) is written as follows:

                                                             1110_Concept Of Permutation Network.png

It means that node connections are 1↔5, 2↔ 4, 3↔1, 4↔3,  5↔2.

The connections are shown in the Figure .

                                   2184_Concept Of Permutation Network 1.png

                                     299_Concept Of Permutation Network 2.png

In these examples, only one set of links exist among input and output nodes and means it is a one stage network.  It may be possible that there exist many  links among input and output (i.e. multistage network).  Permutation of all these in a multistage network are known permutation group and these are represented by a cycle e.g. permutation

P= (1,2,3) (4,5) means the network has two sets of input and output nodes, one set consists of nodes 1,2,3 and another group exists of nodes 4,5 and connections are 1→2, 2→3, 3→1, and 4→5. Here set (1,2,3) has period 3 and (4,5) has period 2, collectively these sets has periodicity 3×2=6.

Interconnection  from all  the  feasible  input  nodes  to  all  the  output  nodes  figured  the permutation group.

The permutations can be combined. This is called composition operation. In composition operation more than two permutations are applied in sequence, e.g. if P1 and P2 are two permutations defined as:

                                        1491_Concept Of Permutation Network 3.png

                                           1549_Concept Of Permutation Network 4.png

Composition of those permutations P1 P2 are characterized in Figures 14 (a) and 14 (b).There are some permutations of special significance in interconnection network.  These permutations are given by hardware. Now, let us talk about these permutations in detail.


Related Discussions:- Concept of permutation network

What is groupware server, What is Groupware server? Groupware addresses...

What is Groupware server? Groupware addresses the management of semi-structured information like text, image, mail, bulletin boards and the flow of work. These Client/Server sy

One basic component is the network device, QUESTION 1. A system analyst...

QUESTION 1. A system analyst has to install a particular type of topology in a textile industry. (a) Describe using diagrams the three most common topologies in terms of nod

State the fundamental principles of 3gpp security, Question : a) What ...

Question : a) What does association refer to in IEEE 802.11? b) State the fundamental principles of 3GPP security. c) Explain the term "binding" in Mobile IPv6 d)

Point out the drawbacks of token ring, Point out the drawbacks of Token Rin...

Point out the drawbacks of Token Ring. Few of the drawbacks of Token Ring are: a. Token Ring is very costly. All topology components cost much more than other more popular s

What are different ways of securing a computer network, What are different ...

What are different ways of securing a computer network? There are lots of ways to do this. Install reliable and updated anti-virus program on all computers. Make sure firewalls

Describe techniques used in location based services, Question: a) Comp...

Question: a) Compare Bluetooth and WIFI based networks over the following factors: Data rate, Range, Application Focus, Battery Power, Frequency Band, Security. b) Differe

Network topology and design, Question 1: The following is a dump of a T...

Question 1: The following is a dump of a TCP header in hexadecimal format: 00CD0018 00000EF1 00000D5D 502200D1 01BF0010 Please answer the following two parts of questions

Describe peer-to-peer networking, You are requested to design a secure home...

You are requested to design a secure home or small scale network (Fig. 1) to satisfy the key concepts underlying computer and network security: confidentiality, integrity, availabi

Domains and sub domains, Hosts are generally, individual machines at a spec...

Hosts are generally, individual machines at a specific location. Normally Resources of host machine are shared and can be used by any user on Internet. Hosts & local networks are g

Acknowledgment number - transport layer, Acknowledgment number This 32...

Acknowledgment number This 32 bit  field  defines  the byte  number that the  from the  segment is expecting to  receive the segment is expecting to receive from the other par

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd