Clos network, Computer Networking

Assignment Help:

Clos network

This network was organized by Clos (1953).  It is a non-blocking network and gives full connectivity like crossbar network but it also requires significantly minimum number of switches. The group of Clos network is shown in  Figure :

                           1244_Clos network.png

Consider an (I) input and (O) output network

Number N is taken such that (I= n.x) and (O=p.y).

In Clos network input phase will consist of X switches each having n input lines and z output lines. The last phase will consist of Y switches every phase having m input lines and p output lines and the middle phase will consist of z crossbar switches, each of size X × Y. To consume all inputs the value of Z is kept larger than or equal to n and p.

The connection among various phases is made as follows:  all outputs of 1st crossbar switch of first phase are connecting with 1st input of all switches of center stage.  (i.e., 1st output of primary page with 1st middle phase, 2nd output of primary phase with 1st input of second switch of middle phase and so on...)

The outputs of second switch of first phase. Phases are linked with 2nd input of a variety of switches of second stage (i.e., 1st output of second switch of 1st phase is joined with 2 input of 1st switch of middle phase and 2nd output of 2nd switch of 1st stage is joined with 2nd input of 2nd switch of middle phase and so on...

Like, connections are prepared between center stage and output stage (i.e. outputs of 1st switch of middle phase are connected with 1st input of a variety of switches of third phase.

Permutation matrix of P in the beyond example the matrix entry will be n


Related Discussions:- Clos network

Transport layer in osi model, The Transport layer implements reliable data ...

The Transport layer implements reliable data transport services. The various functions of Transport Layer are listed below The transport layer is meant for transmitting the data

Source to destination data transfer - datagram approach, Source to Destinat...

Source to Destination Data Transfer - Datagram approach - Each packet is treated independently. - Every pkt will take its own path to reach the destination. - There i

Synchronous tdm and statistical tdm, Difference between synchronous tdm and...

Difference between synchronous tdm and statistical tdm

D2D communication, I need to discuss with some one who expert in D2D commun...

I need to discuss with some one who expert in D2D communications in 5G networks.

describe the mips instructions - computer architecture, 1.  Detail for eac...

1.  Detail for each of the four following MIPS instructions, which actions are being taken at each of their five steps.  Do not forget to mention how and during which steps each in

What is tdm, What is TDM? TDM is a digital process that can be applied ...

What is TDM? TDM is a digital process that can be applied when the data rate capacity of the transmission medium is greater than the data rate needed by the sending and receivi

Verify passwords - ccna, Verify Passwords Step 1 : Telnet to the route...

Verify Passwords Step 1 : Telnet to the router from Host2 and verify the Telnet password. You should be able to telnet to either Fast Ethernet interface of the router. I

Vpn technology - point to point , VPN Technology For an organization  ...

VPN Technology For an organization  VPN  technology  uses some main  techniques for privacy a.Encryption /Authentication b.Tunnelling c.Fire walls

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd