Odd-even merging circuit, Computer Networking

Let us firstly illustrate the idea of merging two sorted sequences using a odd-even merging circuit. The functioning of a merging circuit is as follows:

1)   Let there be two sorted series A=(a1, a2, a3, a4......... am) and B=(b1, b2, b3, b4......... bm) which are required to be merged.

2)   With the help of a merging circuit (m/2, m/2), merge the odd indexed numbers of the two sub series i.e. (a1, a3, a5......... am-1) and (b1, b3, b5......... bm-1) and thus resulting in sorted series (c1, c2, c3......... cm).

3)   After that, with the help of a merging circuit (m/2,m/2), merge the even indexed numbers of the two sub series i.e. (a2, a4, a6......... am) and (b2, b4, b6......... bm) and therefore resulting in sorted series (d1, d2, d3......... dm).

4)   The final output series O=(o1, o2, o3......... o2m ) is achieved in the following manner:

o1 = a1 and o2m = bm .In general the formula is as given below: o2i = min(ai+1,bi ) and

o2I+1 = max(ai+1,bi ) for i=1,2,3,4..........m-1.

Now, let us take an example for merging the two sorted series of length 4, i.e., A=(a1, a2, a3, a4) and B=(b1, b2, b3, b4). Assume the numbers of the series are A=(4,6,9,10) and B=(2,7,8,12). The circuit of merging the two given series is illustrated in Figure.

170_Merging Circuit.png

                                                                          Merging Circuit

Posted Date: 3/2/2013 6:45:36 AM | Location : United States







Related Discussions:- Odd-even merging circuit, Assignment Help, Ask Question on Odd-even merging circuit, Get Answer, Expert's Help, Odd-even merging circuit Discussions

Write discussion on Odd-even merging circuit
Your posts are moderated
Related Questions
Reference models Designing  implementing and  manufacturing  computer  networks  and related  devices  are very  complex  activities. Therefore in order  for this  technolog

Disadvantages of IP sec  Tunnelling mode IP sec  tunnelling  mode has the  following  disadvantage a.Encryption of  small  packets  generates a lot  networks  over head  thu

Q. Presentation layer of osi reference model? - The presentation layer makes sure that the information that the application layer of one system sends out is readable by the app

Q. Explain the Public-Key Cryptography? Public-Key Cryptography - Each user has the same encryption algorithm and key - Decryption algorithm also key are kept secret

As discussed in the earlier section each computer linked to the Internet has a unique address. Let's assume your IP address is 1.2.3.4 & you wish to send a message to the computer

10Base-T: Twisted Pair Ethernet Most popular standard simplest to install and reconfigure Star topology LAN utilize UTP cable no need for AUI It supports data rag

Question: (a) What is a script kiddie? Is it a significant security threat, and why? (b) Assume that UNIX uses the user login name in lieu of the traditional salt, what is


Question 1 List 10 common ActiveX controls Question 2 Discuss Network Interface using any OS Question 3 Explain BGP components and its working Question 4 G

TCP Connections TCP  is an end to end point to point  transport  used in internet. being a point  to point  protocols  means that  there is always  s single  sender  a single