Odd-even merging circuit, Computer Networking

Assignment Help:

Let us firstly illustrate the idea of merging two sorted sequences using a odd-even merging circuit. The functioning of a merging circuit is as follows:

1)   Let there be two sorted series A=(a1, a2, a3, a4......... am) and B=(b1, b2, b3, b4......... bm) which are required to be merged.

2)   With the help of a merging circuit (m/2, m/2), merge the odd indexed numbers of the two sub series i.e. (a1, a3, a5......... am-1) and (b1, b3, b5......... bm-1) and thus resulting in sorted series (c1, c2, c3......... cm).

3)   After that, with the help of a merging circuit (m/2,m/2), merge the even indexed numbers of the two sub series i.e. (a2, a4, a6......... am) and (b2, b4, b6......... bm) and therefore resulting in sorted series (d1, d2, d3......... dm).

4)   The final output series O=(o1, o2, o3......... o2m ) is achieved in the following manner:

o1 = a1 and o2m = bm .In general the formula is as given below: o2i = min(ai+1,bi ) and

o2I+1 = max(ai+1,bi ) for i=1,2,3,4..........m-1.

Now, let us take an example for merging the two sorted series of length 4, i.e., A=(a1, a2, a3, a4) and B=(b1, b2, b3, b4). Assume the numbers of the series are A=(4,6,9,10) and B=(2,7,8,12). The circuit of merging the two given series is illustrated in Figure.

170_Merging Circuit.png

                                                                          Merging Circuit


Related Discussions:- Odd-even merging circuit

Features of parallel virtual machine pvm, Features 1. Simple to install...

Features 1. Simple to install; 2. Simple to configure; 3. Multiple applications from one user can implement; 4. Multiple users can each use PVM concurrently; 5. C, C++, and

How firewall configuration makes all the difference, How Firewall configura...

How Firewall configuration makes all the difference The greatest blunder that any company make is to just install a firewall and think that they have ensured perfect securit

Determine the objectives of computer security, Determine the Objectives of ...

Determine the Objectives of computer security Though computerisation helps a lot in proper organisation of experience, it also opens a Pandora's Box simultaneously. On one

Describe networking, Describe networking. Networking refers to the inte...

Describe networking. Networking refers to the inter connection among computers and peripherals for data communication. Networking can be done using wired cabling or by wireless

What is the structure of ip multicast address, Question : (a) Several ...

Question : (a) Several techniques are now available for users to connect to the Internet. (i) A modem is commonly used to dial up to the Internet. Why is a modem needed fo

State briefly about fddi media, FDDI Media Class B or SAS (single-attac...

FDDI Media Class B or SAS (single-attachment stations) attach to one ring Class A or DAS (dual attachment stations) attach to both rings. SASs is attached to the primary rin

Network Administrator Support, Dear expert; I have an assignment about Net...

Dear expert; I have an assignment about Network Administrator Support . Here is the topic about:- Virtualization is an emerging type of network operating system that is currently

Show the network layer in an internetwork, Q. Show the Network layer in an ...

Q. Show the Network layer in an internetwork? - Receives data from Transport layer - Responsible for creating Packet - Each packet contains - Universal Address of Sour

What is the last step in data encapsulation, The Five steps to data encapsu...

The Five steps to data encapsulation (IN ORDER): 1) User information is changed into data. 2) Data is changed into segments. 3) Segments are changed into datagram and pack

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd