Permutation representation through matrix, Computer Networking

Assignment Help:

Q. Permutation representation through Matrix?

949_Permutation representation through Matrix.png

2417_Permutation representation through Matrix1.png

Figure: Clos Network

The functioning of this above permutation is displayed in Figure. This permutation is able to be represented by subsequent matrix too,

700_Permutation representation through Matrix2.png

Figure: Permutation representation through Matrix

The upper input of all first stage switches will be connected with respective inputs of 1st middle stage switch and lower input of every first stage switches will be connected with respective inputs of 2nd switch. Likewise, all outputs of 1st switch of middle stage will be connected as upper input of switches at third stage. In Benz network to reduce the complexity the middle stage switches can recursively be broken into N/4 × N/4 (then N/8 × M/8), till switch size becomes 2×2.

The connection in a 2×2 switch will either be straight, exchange, lower broadcast or upper broadcast as shown in the below Figure.

2114_Permutation representation through Matrix3.png

The 8×8 Benz network with all switches replaced by a 2×2 is shown in below Figure:

1134_Permutation representation through Matrix4.png

Figure: Benz Network

1427_Permutation representation through Matrix5.png

The Bens network connection for permutation

would be in this manner:-

1901_Permutation representation through Matrix6.png

Figure: 8X8 BENZ NETWORK OF 4 STAGES

The permutation for P = 480_Permutation representation through Matrix7.png  would be following manner:

94_Permutation representation through Matrix8.png

Figure: Line number for n


Related Discussions:- Permutation representation through matrix

Router share information in distance vector routing, Explain how does route...

Explain how does router share information in Distance Vector routing?

State some security models, State some Security Models The first and f...

State some Security Models The first and foremost thing one needs to do is to chalk out a security plan and policy based on any security model. The term security policy shall

Chord, how to implement chord connection as the network management system ?...

how to implement chord connection as the network management system ?

Barters, What is a OSI layer 2 device called a "barter"?

What is a OSI layer 2 device called a "barter"?

Operating system - server and client, Operating System - Server and Client ...

Operating System - Server and Client Various operating systems that support Intranets are all variants of Windows and Unix. In addition to these, certain other software releva

What is the meaning of p-persistent, What is the meaning of P-persistent ...

What is the meaning of P-persistent If the medium is idle, transmit with probability p, and delay one time unit with probability (1 - p); if the medium is busy, continue to lis

Relationship between throughput and delay, If a data packet switch has a qu...

If a data packet switch has a queue of data packets waiting when a new packet reach. The new packet will be located on the whole queue and will have to wait while the switch forwar

Networking, Discuss the interdependence of networking hardware and software...

Discuss the interdependence of networking hardware and software. Is it possible to have one without the other?

Merits of message passage-shared memory, Gives excellent low-level control ...

Gives excellent low-level control of parallelism; Portable; Minimal overhead in data distribution and parallel synchronisation; and It is less error prone. Drawb

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd