Permutation representation through matrix, Computer Networking

Assignment Help:

Q. Permutation representation through Matrix?

949_Permutation representation through Matrix.png

2417_Permutation representation through Matrix1.png

Figure: Clos Network

The functioning of this above permutation is displayed in Figure. This permutation is able to be represented by subsequent matrix too,

700_Permutation representation through Matrix2.png

Figure: Permutation representation through Matrix

The upper input of all first stage switches will be connected with respective inputs of 1st middle stage switch and lower input of every first stage switches will be connected with respective inputs of 2nd switch. Likewise, all outputs of 1st switch of middle stage will be connected as upper input of switches at third stage. In Benz network to reduce the complexity the middle stage switches can recursively be broken into N/4 × N/4 (then N/8 × M/8), till switch size becomes 2×2.

The connection in a 2×2 switch will either be straight, exchange, lower broadcast or upper broadcast as shown in the below Figure.

2114_Permutation representation through Matrix3.png

The 8×8 Benz network with all switches replaced by a 2×2 is shown in below Figure:

1134_Permutation representation through Matrix4.png

Figure: Benz Network

1427_Permutation representation through Matrix5.png

The Bens network connection for permutation

would be in this manner:-

1901_Permutation representation through Matrix6.png

Figure: 8X8 BENZ NETWORK OF 4 STAGES

The permutation for P = 480_Permutation representation through Matrix7.png  would be following manner:

94_Permutation representation through Matrix8.png

Figure: Line number for n


Related Discussions:- Permutation representation through matrix

Explain fdm and tdm with example, Question 1 Explain FDM and TDM with exam...

Question 1 Explain FDM and TDM with example Question 2 Define B-ISDN and explain its services Question 3 What is symmetric key cryptography? Describe one symmetric

Features of transmission control protocol, The major features of TCP are fo...

The major features of TCP are following: Reliability : TCP ensures that any data sent by a sender arrives at the destination as it was sent. There cannot be any data loss or mo

Error control in TCP, Q. Show the Error control in TCP? Error control ...

Q. Show the Error control in TCP? Error control in TCP Detect lost segments, out-of-order segments, corrupted segments and duplicated segments Three tools: chec

Give example of the network layer, Most protocol suites have dissimilar OSI...

Most protocol suites have dissimilar OSI layer protocols within them. At layer 3, IP is for TCP/IP. TCP is layer 4. IPX is for IPX/SPX. SPX is layer 4. DDP is for Appletal

Case study, #questi Scenario: Your Case Study must be based on the informat...

#questi Scenario: Your Case Study must be based on the information provided. There will be no additional information. This must be submitted in a .doc, or .pdf format. If you sen

System - network administrator, The program must be well documented which i...

The program must be well documented which includes meaningful variable and subroutine names ("self documenting code") along with comments in the code. The following block of code w

Importance of reliability engineering, The progress of any industry and ind...

The progress of any industry and indeed countries as well, today is linked to the effective performance of its equipments, processes and systems. Reliability engineering, not only

Explain fiber-optics cable, Explain Fiber-Optics cable. A cable with ce...

Explain Fiber-Optics cable. A cable with central glass tube covered with protective shield which transmit data using photons is fiber optics cable. These cables transmit data t

Tunnelling - point to point, Tunnelling To guarantee privacy for the  o...

Tunnelling To guarantee privacy for the  organization, VPN specifies that each IP datagram destined for private  use of the  organization, must  first be  encrypted and then en

How a token ring networks allows sharing of bandwidth, Question: (a) E...

Question: (a) Explain how a Token Ring networks allows sharing of bandwidth (access control). (b) (i) CSMA/CD is not appropriate for wireless communication. Explain wh

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd