Butterfly permutation, Computer Networking

Assignment Help:

Butterfly permutation

This permutation is getting by interchanging the important significant bit in address with smallest significant bit.

                                  2438_Butterfly permutation.png

Ex. Xn-1,    Xn-2,   and X1.X0 = X0   Xn-2 ....... X1   Xn-1

001↔100,         010↔010

011↔110,

An interconnection network stand on this permutation is the butterfly network. A butterfly network is called a blocking network and it does not permit an arbitrary connection of N inputs to N outputs without clash. The butterfly network is customized in Benz network. The Benz network is said to be non-blocking network and it is produced by joining two butterfly networks back to back, in such a way that data flows forward through one and in reverse through the other.


Related Discussions:- Butterfly permutation

Example programmes for parallel systems-adding element, Example Programmes ...

Example Programmes for Parallel Systems Now we shall complete this with the examples on shared memory programming. Example 13: Adding elements of an array using two proce

What are the fundamentals of intranet, Fundamentals of intranet Introd...

Fundamentals of intranet Introduction The history of the Intranet starts right from the days when computer networks came in. However, it could find a name and place for it

Define post office and lightweight directory access protocol, Post Office P...

Post Office Protocol and Lightweight Directory Access Protocol POP: Post Office Protocol is a used by mail clients to download messages from a mail server on the Internet. L

Calculate the voltage on the capacitor, Quetion: A 22 nF capacitor is i...

Quetion: A 22 nF capacitor is initially charged to 10V. It is then discharged by connecting a 100kW resistor across it. Approximately how long does it take for the voltage on t

Why we use numbering frames, Q. Why we use numbering frames? Why numbe...

Q. Why we use numbering frames? Why numbering frames? Stop--and-wait ARQ, 1. Numbering Frames prevents the retaining of duplicate frames.. 2. Numbered acknowled

Subnet layer of the tcp-ip model, Q. Subnet layer of the TCP-IP model? ...

Q. Subnet layer of the TCP-IP model? These two layers of the OSI correspond straight to the subnet layer of the TCP/IP model. Majority of the time the lower layers under the

Set up to use pvm run and complie, PVM uses two environment variables when ...

PVM uses two environment variables when starting and running. Every PVM user needs to set these two variables to use PVM. The initial variable is PVM_ROOT, which is set to the loca

Define the backbone networks, Q. Define the Backbone Networks? Backbon...

Q. Define the Backbone Networks? Backbone Networks - Allows several LANs to be connected - Non of station is directly connected to the backbone - Stations are part

Firewall, confiriguration,capabilities,implementation

confiriguration,capabilities,implementation

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd