Concept of permutation network, Computer Networking

Concept Of Permutation Network

In permutation interconnection networks the information replace requires data transfer from input set of nodes to output set of nodes and likely connections among edges are established  by  applying  a variety of  permutations  in  available  links.  There  are  a variety of networks where multiple paths from source to destination are feasible.  For finding out what the feasible routes in such networks are the learning of the permutation theory is a must.

Let us see,  the basic concepts of permutation with respect to interconnection network. Let us say the network has place of n input nodes and n output nodes.

Permutation P for a network of 5 nodes (i.e., n = 5) is written as follows:

                                                             1110_Concept Of Permutation Network.png

It means that node connections are 1↔5, 2↔ 4, 3↔1, 4↔3,  5↔2.

The connections are shown in the Figure .

                                   2184_Concept Of Permutation Network 1.png

                                     299_Concept Of Permutation Network 2.png

In these examples, only one set of links exist among input and output nodes and means it is a one stage network.  It may be possible that there exist many  links among input and output (i.e. multistage network).  Permutation of all these in a multistage network are known permutation group and these are represented by a cycle e.g. permutation

P= (1,2,3) (4,5) means the network has two sets of input and output nodes, one set consists of nodes 1,2,3 and another group exists of nodes 4,5 and connections are 1→2, 2→3, 3→1, and 4→5. Here set (1,2,3) has period 3 and (4,5) has period 2, collectively these sets has periodicity 3×2=6.

Interconnection  from all  the  feasible  input  nodes  to  all  the  output  nodes  figured  the permutation group.

The permutations can be combined. This is called composition operation. In composition operation more than two permutations are applied in sequence, e.g. if P1 and P2 are two permutations defined as:

                                        1491_Concept Of Permutation Network 3.png

                                           1549_Concept Of Permutation Network 4.png

Composition of those permutations P1 P2 are characterized in Figures 14 (a) and 14 (b).There are some permutations of special significance in interconnection network.  These permutations are given by hardware. Now, let us talk about these permutations in detail.

Posted Date: 3/2/2013 6:06:00 AM | Location : United States







Related Discussions:- Concept of permutation network, Assignment Help, Ask Question on Concept of permutation network, Get Answer, Expert's Help, Concept of permutation network Discussions

Write discussion on Concept of permutation network
Your posts are moderated
Related Questions
What is Piggy Backing? A process called piggybacking is used to get better the efficiency of the bidirectional protocols. When a frame is carrying data from A to B, it can also

Explain about star topology This topology, obviously, needs a great deal of cabling. This design gives an excellent platform for reconfiguration and trouble-shooting. Changes t

Sonet Devices STS Mux or DMux either multiplexes signals from multiple sources into an STS or demultiplexes an STS into different destination signals. Regenerator is a repea

Question: (a) Show the main elements of the GSM system architecture and describe their functions. (b) Looking at the HLR/VLR database approach used in GSM-how does this arc

Receive Window This  field  defines the size  of the  window in bytes  that the  other party  must  maintain. Note  that the  length  of this  field 16 bits  which  means

Configure the Host Computers Step 1: Configure host computers. Configure the static IP address, subnet mask, and gateway for every host computer based on the configuration

Explain the term - global corporate-wide network It would be highly interesting to note that more than 70 per cent of all security related problems start from within the organi

Submission instructions: Answer the following questions using a text processing software and submit your answers via connex. Possible file formats for your submission file(s) are .

802.11b HR DSSS a) High-rate DSSS using a 2.4 GHz band b) Similar to DSSS excluding for encoding method c) Uses complementary code keying (CCK), encoding 4 or 8 bits to

Networks are more frequently being prepared to allow specification of the quality of service needed by users. For example: - a typical voice telephone call may give a QoS para