Permutation representation through matrix, Computer Networking

Assignment Help:

Q. Permutation representation through Matrix?

949_Permutation representation through Matrix.png

2417_Permutation representation through Matrix1.png

Figure: Clos Network

The functioning of this above permutation is displayed in Figure. This permutation is able to be represented by subsequent matrix too,

700_Permutation representation through Matrix2.png

Figure: Permutation representation through Matrix

The upper input of all first stage switches will be connected with respective inputs of 1st middle stage switch and lower input of every first stage switches will be connected with respective inputs of 2nd switch. Likewise, all outputs of 1st switch of middle stage will be connected as upper input of switches at third stage. In Benz network to reduce the complexity the middle stage switches can recursively be broken into N/4 × N/4 (then N/8 × M/8), till switch size becomes 2×2.

The connection in a 2×2 switch will either be straight, exchange, lower broadcast or upper broadcast as shown in the below Figure.

2114_Permutation representation through Matrix3.png

The 8×8 Benz network with all switches replaced by a 2×2 is shown in below Figure:

1134_Permutation representation through Matrix4.png

Figure: Benz Network

1427_Permutation representation through Matrix5.png

The Bens network connection for permutation

would be in this manner:-

1901_Permutation representation through Matrix6.png

Figure: 8X8 BENZ NETWORK OF 4 STAGES

The permutation for P = 480_Permutation representation through Matrix7.png  would be following manner:

94_Permutation representation through Matrix8.png

Figure: Line number for n


Related Discussions:- Permutation representation through matrix

What is network address, Q. What is Network Address? Network Address ...

Q. What is Network Address? Network Address First address in the block, assigned to the organization Defines the network itself and cannot be assigned to a host

Show the refraction and reflection in Fiber-optic cable , Q. Show the Refra...

Q. Show the Refraction and Reflection in Fiber-optic cable ? - Refraction often takes place when light bends as it passes from one medium to another less dense medium - Wh

Ethernet fields, ETHERNET FIELDS:  In Ethernet fields the preamble and...

ETHERNET FIELDS:  In Ethernet fields the preamble and CRC is usually not given in frame. The destination address of each is the broadcast address. There is special value reser

Internet infrastructure, Thus now you know how packets travel from one comp...

Thus now you know how packets travel from one computer to another computer over the Internet. however what's in-between? What in fact makes up the Internet infrastructure or backbo

Analyze snort or pcap data from a public wifi hotspot, The project idea is ...

The project idea is : Analyze Snort or PCAP data from a public WIFI hotspot (describe traffice seen and what it is, protocols, ports, etc). This is what is expected. Initially r

What are the threats include in computer software, What are the threats inc...

What are the threats include in computer software The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to

Advantage of ip sec tunnelling mode, Advantage of IP sec  Tunnelling Mode ...

Advantage of IP sec  Tunnelling Mode IP Sec  tunnelling mode  has the  following  advantages: a.Security : Ts IP sec tunnelling mode  secure somewhat but  not the best. In a

Combine subtitution and transposition, how to own cipher to encrypt and dec...

how to own cipher to encrypt and decrypt message by combine both substitution ans transposition algorithm using c program

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd