Butterfly permutation, Computer Networking

Butterfly permutation

This permutation is getting by interchanging the important significant bit in address with smallest significant bit.

                                  2438_Butterfly permutation.png

Ex. Xn-1,    Xn-2,   and X1.X0 = X0   Xn-2 ....... X1   Xn-1

001↔100,         010↔010

011↔110,

An interconnection network stand on this permutation is the butterfly network. A butterfly network is called a blocking network and it does not permit an arbitrary connection of N inputs to N outputs without clash. The butterfly network is customized in Benz network. The Benz network is said to be non-blocking network and it is produced by joining two butterfly networks back to back, in such a way that data flows forward through one and in reverse through the other.

Posted Date: 3/2/2013 6:23:22 AM | Location : United States







Related Discussions:- Butterfly permutation, Assignment Help, Ask Question on Butterfly permutation, Get Answer, Expert's Help, Butterfly permutation Discussions

Write discussion on Butterfly permutation
Your posts are moderated
Related Questions
What is a pointer and does Java support pointers? Pointer is a reference handle to a memory location. Improper handling of pointers leads to memory leaks and reliability issues

Problem: (a) Explain how TCP handles connection-setup management. (b) Each host on the Internet is currently assigned an IP address 32 bits long (IPv4). IPv4 addresses are u

Q. What is Aspects of Security? - Security Attack: Any action whichcompromises the security of information owned by an organization. - Security Mechanism: A mechanism th

Q. Explain about Flow Control? - Signifies to ask the transmitter to stop/resume sending in data - Required when DTE to DCE speed > DCE to DCE speed - (Exampl

TOP Level Domain  (TLD) Servers These  servers are responsible  for top  level  domains such  as com org net edu, and  going  and all  the country  top level  domains  such  a

Short for Internet Message Access Protocol. This is another most prevalent protocol of internet standard for email usage apart from POP. Usually all the modern email server and cli

Question : (a) List down and explain the different signal propagation behaviours that radio waves exhibit. (b) Explain the term Delay Spread with reference to signal propaga

The three ways to give login access to the router are by the Console port, auxiliary port, and virtual terminal (Telnet)

Write the layer on which layer does L2F, PPTP and L2TP operate?

You are the Senior Project Manager in a software company and have, as part of your team, a student on a three month internship. The student has proudly told you that they have stu