Butterfly permutation, Computer Networking

Butterfly permutation

This permutation is getting by interchanging the important significant bit in address with smallest significant bit.

                                  2438_Butterfly permutation.png

Ex. Xn-1,    Xn-2,   and X1.X0 = X0   Xn-2 ....... X1   Xn-1

001↔100,         010↔010


An interconnection network stand on this permutation is the butterfly network. A butterfly network is called a blocking network and it does not permit an arbitrary connection of N inputs to N outputs without clash. The butterfly network is customized in Benz network. The Benz network is said to be non-blocking network and it is produced by joining two butterfly networks back to back, in such a way that data flows forward through one and in reverse through the other.

Posted Date: 3/2/2013 6:23:22 AM | Location : United States

Related Discussions:- Butterfly permutation, Assignment Help, Ask Question on Butterfly permutation, Get Answer, Expert's Help, Butterfly permutation Discussions

Write discussion on Butterfly permutation
Your posts are moderated
Related Questions
What is an Ethernet? The Ethernet topology was developed at the University of Hawaii to connect computers on the many Islands. It was radio based design. Later, Robert Metacalf

Overview of the Transport  Layer Protocols Transport layer  can be  available  more than  protocols  to the  network  applications. For  example the network  applications. For

What are the working of software team The software team has to learn every bit of things related to computers. Since different users work on different platforms and application

Simple Mail Transfer Protocoland Secure Sockets Layer SMTP: Simple Mail Transfer Protocol is a server-to-server protocol for delivering electronic mail. SSL: Secure Sockets

Q. Define Guided Media? - Offers a conduit from one device to another - Signal is directed as well as contained by physical limits of medium - Twisted-pair and coaxial ut

Q. What is Source Routing? Source Routing - Sender of packet defines bridges and routes that packet should take - Complete path of bridge IDs and destination address i

Single company or organization owns this. They are usually LAN technologies. There can be multiple LANs in a campus or building linked together. They are sometimes known Intranet.

a) Consider a hypothetical arrangement of ‘self-learning' bridges shown in the figure below. Assuming all are initially empty, give the forwarding tables for each of the bridges B

State about the Single Sign-On Intranet This Intranet, if managed efficiently, allows maximum security by firewalling anyone from inappropriate sites automatically. For exam