Odd-even merging circuit, Computer Networking

Assignment Help:

Let us firstly illustrate the idea of merging two sorted sequences using a odd-even merging circuit. The functioning of a merging circuit is as follows:

1)   Let there be two sorted series A=(a1, a2, a3, a4......... am) and B=(b1, b2, b3, b4......... bm) which are required to be merged.

2)   With the help of a merging circuit (m/2, m/2), merge the odd indexed numbers of the two sub series i.e. (a1, a3, a5......... am-1) and (b1, b3, b5......... bm-1) and thus resulting in sorted series (c1, c2, c3......... cm).

3)   After that, with the help of a merging circuit (m/2,m/2), merge the even indexed numbers of the two sub series i.e. (a2, a4, a6......... am) and (b2, b4, b6......... bm) and therefore resulting in sorted series (d1, d2, d3......... dm).

4)   The final output series O=(o1, o2, o3......... o2m ) is achieved in the following manner:

o1 = a1 and o2m = bm .In general the formula is as given below: o2i = min(ai+1,bi ) and

o2I+1 = max(ai+1,bi ) for i=1,2,3,4..........m-1.

Now, let us take an example for merging the two sorted series of length 4, i.e., A=(a1, a2, a3, a4) and B=(b1, b2, b3, b4). Assume the numbers of the series are A=(4,6,9,10) and B=(2,7,8,12). The circuit of merging the two given series is illustrated in Figure.

170_Merging Circuit.png

                                                                          Merging Circuit


Related Discussions:- Odd-even merging circuit

What security risks present on the networks, Security risks present on the ...

Security risks present on the networks Lots of risks are present everywhere on Internet as well as on Intranet, if it is not known what is being done. Every day a number of

Why is the authentication and key agreement of 3gpp weak, Question 1: a...

Question 1: a) How is the four-way exchange employed for mutual authentication in WPA/RSN? b) Elaborate on how inquiry attacks and traffic monitoring attacks can be u

Distribution of dns - application layer , Distribution of DNS 1.By cen...

Distribution of DNS 1.By centralized data base The information contained in the domain  name space must be stored. A simple design  or DNS would have one DNS server that co

Explain about the digital traffic channels, Explain about the Digital traff...

Explain about the Digital traffic channels The most notable difference among the two generations is that first generation systems are almost purely analog, while second generat

What is encapsulation and de-encapsulation, Process to send data is called ...

Process to send data is called as encapsulation and process to receive data is called De-encapsulation.

Hardware difficulty of benz network, Hardware difficulty of Benz Network: -...

Hardware difficulty of Benz Network: - Benz network uses smaller switches and it gives excellent connectivity.  To find hardware difficulty of Benz network let us presume that

Describe the term - license-free operation, Describe the term - License-fre...

Describe the term - License-free operation Users would prefer to buy and operate wireless LAN products without having to secure a license for the frequency band used by the LAN

Explain data communications, The distance over which data moves within a co...

The distance over which data moves within a computer may differ from a few thousandths of an inch, as is the case within a one IC chip, to as much as lot of feet along the backplan

Explain physical layer of osi reference model, Q. Explain physical layer of...

Q. Explain physical layer of Osi reference model? - The physical layer deals among the physical characteristics of the transmission medium. - It defines the mechanical, elec

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd