Permutation representation through matrix, Computer Networking

Assignment Help:

Q. Permutation representation through Matrix?

949_Permutation representation through Matrix.png

2417_Permutation representation through Matrix1.png

Figure: Clos Network

The functioning of this above permutation is displayed in Figure. This permutation is able to be represented by subsequent matrix too,

700_Permutation representation through Matrix2.png

Figure: Permutation representation through Matrix

The upper input of all first stage switches will be connected with respective inputs of 1st middle stage switch and lower input of every first stage switches will be connected with respective inputs of 2nd switch. Likewise, all outputs of 1st switch of middle stage will be connected as upper input of switches at third stage. In Benz network to reduce the complexity the middle stage switches can recursively be broken into N/4 × N/4 (then N/8 × M/8), till switch size becomes 2×2.

The connection in a 2×2 switch will either be straight, exchange, lower broadcast or upper broadcast as shown in the below Figure.

2114_Permutation representation through Matrix3.png

The 8×8 Benz network with all switches replaced by a 2×2 is shown in below Figure:

1134_Permutation representation through Matrix4.png

Figure: Benz Network

1427_Permutation representation through Matrix5.png

The Bens network connection for permutation

would be in this manner:-

1901_Permutation representation through Matrix6.png

Figure: 8X8 BENZ NETWORK OF 4 STAGES

The permutation for P = 480_Permutation representation through Matrix7.png  would be following manner:

94_Permutation representation through Matrix8.png

Figure: Line number for n


Related Discussions:- Permutation representation through matrix

Explain linear array interconnection networks, Linear Array: This is a most...

Linear Array: This is a most basic interconnection pattern. Processors are connected in a linear one-dimensional array. The first as well as last processors are attached with one a

Wifi and 3g, what is similarity of wifi and 3g

what is similarity of wifi and 3g

Threats to information can include, Threats to information can include ...

Threats to information can include Deletion of a file or files. Corruption, caused either by hardware problems or by a bug in the software. Theft of company data

What are the important topologies for networks, What are the important topo...

What are the important topologies for networks? BUS topology: In this every computer is directly linked to primary network cable in a single line. Advantages: Inexpensive,

Define virtual channel, Virtual channel is normally a link from one source...

Virtual channel is normally a link from one source to one destination, although multicast connections are also allowed. The other name for virtual channel is virtual circuit.

Types of ends in wan, There are two types of ends in WAN (1)DTE (DATA TE...

There are two types of ends in WAN (1)DTE (DATA TERMINAL EQUIPMENT) (2)DCE(DATA COMMUNICATION EQUIPMENT)

Data and block distribution, Data Distribution Data distribution direct...

Data Distribution Data distribution directives tell the compiler how the program data is to be distributed between the memory areas associated with a set of processors. The log

Categories to access the intranet, Categories to access the Intranet P...

Categories to access the Intranet Persons who can find access to the Intranet can be put into three categories. 1.  Those who can enter the site 2.  Those who can access

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd