Describe how the processor computes the tag

Assignment Help Basic Computer Science
Reference no: EM131051230

The Omega network shown in Figure F.11 on page F-31 consists of three columns of four switches, each with two inputs and two outputs. Each switch can be set to straight, which connects the upper switch input to the upper switch output and the lower input to the lower output, and to exchange, which connects the upper input to the lower output and vice versa for the lower input. For each column of switches, label the inputs and outputs 0, 1, . . . , 7 from top to bottom, to correspond with the numbering of the processors.

a. When a switch is set to exchange and a message passes through,w hat is the relationship between the label values for the switch input and output used by the message? (Hint Think in terms of operations on the digits of the binary representation of the label number.)

b. Between any two switches in adjacent columns that are connected by a link, what is the relationship between the label of the output connected to the input?

c. Based on your results in parts (a) and (b), design and describe a simple routing scheme for distributed control of the Omega network. A message will carry a routing tag computed by the sending processor. Describe how the processor computes the tag and how each switch can set itself by examining a bit of the routing tag.

Reference no: EM131051230

Questions Cloud

A security with a beta of zero is risk free : The Glass-Steagall act of 1993 separated commercial banking from investment banking. A security with a beta of zero is risk free. If a stock liew above the securities market line, it is overvalued. There is an overwhelming majority of evidence agains..
Planning to factor some of its receivables : Moon Hardware is planning to factor some of its receivables. The cash received will be used to pay for inventory purchases. The factor has indicated that it will require "recourse" on the sold receivables. Explain to the controller of Moon Hardwar..
Present a summary of your recommendations on culture : You are required to present a summary of your recommendations on culture, communication and cultural competence
Basic macroeconomic topic : First find an article that is about a basic macroeconomic topic. The article can be from the internet, newspaper, or a magazine. The topic of the paragraph is what the article is about.
Describe how the processor computes the tag : Based on your results in parts (a) and (b), design and describe a simple routing scheme for distributed control of the Omega network. A message will carry a routing tag computed by the sending processor. Describe how the processor computes the tag..
Federal reserve takes actions that increase risk-free rate : BLW Corporation is considering the terms to be set on the options it plans to issue to its executives. Which of the following actions would decrease the value of the options, other things held constant? The exercise price of the option is increased. ..
Control purchasing and accounts payable : An accounting information system (AIS) must include certain source documents in order to control purchasing and accounts payable. For a manufacturing organization, the best set of documents should include:
Before converging to the industry median growth rate : The Fast-Growth Company recently paid a dividend of $3.20 per share. Analysts expect the dividend to grow at the rate of 28% per year for 3 years, then by 16% for 3 more years, before converging to the industry median growth rate of 7%. The firm’s be..
How long will take you to pay off mortgage after refinancing : The mortgage on your house is 5 years old. It required monthly payments of 1,422, had an original term of 30 years, and had an interest rate of 10% (APR –monthly). What monthly repayments will be required with the new loan? Suppose you are willing to..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Which multiplication is possible perform it using matlab

Generate a matrix D = [A;B]. Now generate a new matrix E = [D C]. Find the determinant of matrix E. Find the inverse of matrix E. Find the transpose of matrix E. Define a new matrix F = [16;3;17;12;-2]. Define another matrix H = [5 7 4 -2 -1;-9 3 12 ..

  What is the present worth of the savings to the utility

what is the present worth of the savings (in $/acre-ft) to the utility between the old and the new contracts? Let the interest rate equal 6% per year.

  Write a program in c++ for a server

Write a program in C++ for a server (called math solver) which solves three math problems: factorial (i.e. n!), exponent with base 2 (i.e. 2n), and cube (i.e. n3).

  One of the reasons joseph schumpeter argued

One of the reasons Joseph SchumPeter argued that capital was doomed was because he predicted that big corporations would naturally shift away from risk taking entrepreneurship in favor of low risk managerial strategies. Has this happened? Have major ..

  Create a quick wedding program in indesign

create a quick wedding program in Indesign. Are there any websites with templates for wedding programs for Indesign? I am using Indesign CC.

  What are the advantages and disadvantages for outsourcing

What are the advantages and disadvantages for outsourcing a system from another Organization?

  Initiate a compaction of free memory

In this exercise, we simulate a memory allocation (we just want to see the effect of fragmentation and of compacting memory fragments into larger ones). For this, we manage a list of memory segments in our program:typedef struct segment { int star..

  Bolstering network security by using group policy

Bolstering Network Security by Using Group Policy and Configuring GPO Security Settings

  What are the various types of wireless security

What are the various types of wireless security. which method is the best and why?

  Ttime for implementation, and return on investment

You are the database administrator for your company. As your company continues to grow and expand, you have been asked to look into a client-server architecture for your database, which will allow you to have a database in a distributed environment. ..

  Show layout of specified cache for cpu address memory

Show the layout of the specified cache for a CPU that can address 8M x 16 of memory. Give the layout of the bits per location and the total number of locations.

  Investigate project management body of knowledge

Investigate Project Management Body of Knowledge (PMBoK). Write a report on one of knowledge areas. Describe the task of understanding potential threats

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd