Odd-even merging circuit, Computer Networking

Assignment Help:

Let us firstly illustrate the idea of merging two sorted sequences using a odd-even merging circuit. The functioning of a merging circuit is as follows:

1)   Let there be two sorted series A=(a1, a2, a3, a4......... am) and B=(b1, b2, b3, b4......... bm) which are required to be merged.

2)   With the help of a merging circuit (m/2, m/2), merge the odd indexed numbers of the two sub series i.e. (a1, a3, a5......... am-1) and (b1, b3, b5......... bm-1) and thus resulting in sorted series (c1, c2, c3......... cm).

3)   After that, with the help of a merging circuit (m/2,m/2), merge the even indexed numbers of the two sub series i.e. (a2, a4, a6......... am) and (b2, b4, b6......... bm) and therefore resulting in sorted series (d1, d2, d3......... dm).

4)   The final output series O=(o1, o2, o3......... o2m ) is achieved in the following manner:

o1 = a1 and o2m = bm .In general the formula is as given below: o2i = min(ai+1,bi ) and

o2I+1 = max(ai+1,bi ) for i=1,2,3,4..........m-1.

Now, let us take an example for merging the two sorted series of length 4, i.e., A=(a1, a2, a3, a4) and B=(b1, b2, b3, b4). Assume the numbers of the series are A=(4,6,9,10) and B=(2,7,8,12). The circuit of merging the two given series is illustrated in Figure.

170_Merging Circuit.png

                                                                          Merging Circuit


Related Discussions:- Odd-even merging circuit

What are the various security measures, What are the various security meas...

What are the various security measures A matter of prime concern to companies is the overheads in the form of huge investment on extra hardware and software. It is quite possi

Public key cryptography and private key cryptography, Question: a) Di...

Question: a) Differentiate between the following key terms used in any e-banking security system: (i) Authorisation v/s Authentication. (ii) Data Integrity v/s Data Conf

advance routing, i need help with this assigmnet reply asap pleas

i need help with this assigmnet reply asap please

Tunnelling - point to point, Tunnelling To guarantee privacy for the  o...

Tunnelling To guarantee privacy for the  organization, VPN specifies that each IP datagram destined for private  use of the  organization, must  first be  encrypted and then en

Example on multiplicative decrease, Q. Example on Multiplicative Decrease? ...

Q. Example on Multiplicative Decrease? w = 1 for (each new ACK received) w = w+1 until (loss detected or w >= ssthresh) Not so slow - Exponential increase

Deteemine token bus of 802.3, Token Bus Physical order of stations ...

Token Bus Physical order of stations doesn't matter Line is broadcast medium "Send" token by addressing neighbour Provisions for deleting, adding stations

Explain a transaction server, With a transaction server, the client request...

With a transaction server, the client requests remote procedures that reside on the server with an SQL database engine. These remote processes on the server execute a group of SQL

What are general middleware, It consists of the communication stacks, distr...

It consists of the communication stacks, distributed directories, authentication services, network time, RPC, Queuing services along with the network OS extensions like the distrib

Define the term pipelined processor, Pipelined Processor A pipeline pro...

Pipelined Processor A pipeline processor can be described as a processor which comprises of a series of processing circuits known as segments and a stream of operands (data) is

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd