Concept of permutation network, Computer Networking

Assignment Help:

Concept Of Permutation Network

In permutation interconnection networks the information replace requires data transfer from input set of nodes to output set of nodes and likely connections among edges are established  by  applying  a variety of  permutations  in  available  links.  There  are  a variety of networks where multiple paths from source to destination are feasible.  For finding out what the feasible routes in such networks are the learning of the permutation theory is a must.

Let us see,  the basic concepts of permutation with respect to interconnection network. Let us say the network has place of n input nodes and n output nodes.

Permutation P for a network of 5 nodes (i.e., n = 5) is written as follows:

                                                             1110_Concept Of Permutation Network.png

It means that node connections are 1↔5, 2↔ 4, 3↔1, 4↔3,  5↔2.

The connections are shown in the Figure .

                                   2184_Concept Of Permutation Network 1.png

                                     299_Concept Of Permutation Network 2.png

In these examples, only one set of links exist among input and output nodes and means it is a one stage network.  It may be possible that there exist many  links among input and output (i.e. multistage network).  Permutation of all these in a multistage network are known permutation group and these are represented by a cycle e.g. permutation

P= (1,2,3) (4,5) means the network has two sets of input and output nodes, one set consists of nodes 1,2,3 and another group exists of nodes 4,5 and connections are 1→2, 2→3, 3→1, and 4→5. Here set (1,2,3) has period 3 and (4,5) has period 2, collectively these sets has periodicity 3×2=6.

Interconnection  from all  the  feasible  input  nodes  to  all  the  output  nodes  figured  the permutation group.

The permutations can be combined. This is called composition operation. In composition operation more than two permutations are applied in sequence, e.g. if P1 and P2 are two permutations defined as:

                                        1491_Concept Of Permutation Network 3.png

                                           1549_Concept Of Permutation Network 4.png

Composition of those permutations P1 P2 are characterized in Figures 14 (a) and 14 (b).There are some permutations of special significance in interconnection network.  These permutations are given by hardware. Now, let us talk about these permutations in detail.


Related Discussions:- Concept of permutation network

Architecture of cisco ios software, Architecture of Cisco IOS software ...

Architecture of Cisco IOS software Cisco IOS might not  applications like ms word,multimedia softwares. It is mainly for switching data packet and concentrated on switching p

Projecr assingment, I have a project that need to be submit as soon as poss...

I have a project that need to be submit as soon as possible

Cipher password guess-cryptography, a. If a password to a cipher is exactly...

a. If a password to a cipher is exactly 8 characters long, and each character can be selected from [0-9], [a-z], and [A-Z], how many different passwords are possible? b. Suppose

Debug igrp, As a system administrator, you require to debug igrp but are wo...

As a system administrator, you require to debug igrp but are worried that the "debug IP igrp transaction" command will flood the console. What is the command that you should use?

SAN, Case study on SAN Providers and Products available in the market.

Case study on SAN Providers and Products available in the market.

Determine about unique least-cost path, Determine about unique least-cost p...

Determine about unique least-cost path If there is a unique least-cost path, the two algorithms will yield the similar result because they are both guaranteed to search the lea

What is the protocol number for tcp, Transmission Control Protocol - TCP i...

Transmission Control Protocol - TCP is a connection oriented transport layer protocol with built unreliability. It considers a large block of data and breaks it down into segments

What is authentication, Q. What is Authentication ? - Verification of s...

Q. What is Authentication ? - Verification of sender's identity. - Accomplished through a digital signature, which is based on public key encryption/decryption. - Uses re

Describe the tcp/ip reference model, Computer Networks 1. Differentiate...

Computer Networks 1. Differentiate WAN and LAN. 2. Describe the TCP/IP Reference Model with diagram. 3. Explain Circuit switching and message switching. 4. List the fu

Discuss an example of threats in computer software, Discuss an example of t...

Discuss an example of threats in computer software Assume only one attack out of the above list i.e., the virus attack. Though the present anti-virus software solutions can det

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd