Combinational circuit for sorting the string, Computer Networking

Every input line of the combinational circuit represents an individual element of the string say xi and every output line results in the form of a sorted list. In order to attain the above given task, a comparator is employed for the processing.

Every comparator has two input lines, say a and b, and likewise two output lines, say c and d. Every comparator provides two outputs i.e., c provides maximum of a and b (max Parallel Algorithms & Parallel Programming (a, b)) and d gives minimum of a and b (min (a, b)) in comparator InC and DeC it is opposite, as shown given Figure.

In general, there are two types of comparators, often called as increasing comparators and decreasing comparators indicated by + BM(n) and - BM(n) where n indicates the number of input lines and output lines of the comparator. The depth of + BM (n) and - BM (n) is log n. These comparators are engaged for constructing the circuit of sorting.

971_Decreasing Comparator, for n inputs.png

                                                       Decreasing Comparator, for n inputs

Posted Date: 3/2/2013 6:38:40 AM | Location : United States







Related Discussions:- Combinational circuit for sorting the string, Assignment Help, Ask Question on Combinational circuit for sorting the string, Get Answer, Expert's Help, Combinational circuit for sorting the string Discussions

Write discussion on Combinational circuit for sorting the string
Your posts are moderated
Related Questions
Describe the functions and significances of all fields (such as Source Port and Destination Port) of a TCP header. Functions and significance of tcp header's fields FIELDS

Single Program Multiple Date A common style of writing data parallel programs for MIMD computers is SPMD (single program, multiple data): all the processors implement the same

COMPUTER NETWORKS 1. What do you mean by open system? What is the purpose of OSI model? Explain the layered architecture of OSI model. 2. Define the following terms: a) Ana

Question: Consider that you have to configure a small WLAN of 8 computers using Wired Equivalent Privacy (WEP) and that you have to best make use of its available security f

State some Security Models The first and foremost thing one needs to do is to chalk out a security plan and policy based on any security model. The term security policy shall

TOP Level Domain  (TLD) Servers These  servers are responsible  for top  level  domains such  as com org net edu, and  going  and all  the country  top level  domains  such  a

Options The options  fields may be  used to  provide  other functions that are not  covered by  the header. If the length  of the  options  field is not  a multiple of 32 bits

Determine the concept of placing antenna on hieght First, starting deployment simply placed cells in regions where there was high density of vehicle or human population. Once t

What is source route and OSPF? Source route It is a series of IP addresses identifying the route a datagram must follow. A source route might optionally be included in an

Question 1: ‘There is an overwhelming imperative for organisations to analyse every bit of information they can extract from their huge data warehouses for competitive advant