Combinational circuit for sorting the string, Computer Networking

Assignment Help:

Every input line of the combinational circuit represents an individual element of the string say xi and every output line results in the form of a sorted list. In order to attain the above given task, a comparator is employed for the processing.

Every comparator has two input lines, say a and b, and likewise two output lines, say c and d. Every comparator provides two outputs i.e., c provides maximum of a and b (max Parallel Algorithms & Parallel Programming (a, b)) and d gives minimum of a and b (min (a, b)) in comparator InC and DeC it is opposite, as shown given Figure.

In general, there are two types of comparators, often called as increasing comparators and decreasing comparators indicated by + BM(n) and - BM(n) where n indicates the number of input lines and output lines of the comparator. The depth of + BM (n) and - BM (n) is log n. These comparators are engaged for constructing the circuit of sorting.

971_Decreasing Comparator, for n inputs.png

                                                       Decreasing Comparator, for n inputs


Related Discussions:- Combinational circuit for sorting the string

What is anonymous FTP, What is anonymous FTP and why would you use it A...

What is anonymous FTP and why would you use it Anonymous FTP enables users to join to a host without using a valid login and password. Generally, anonymous FTP uses a login kno

Computer Information Systems, I am taking a computer information systems cl...

I am taking a computer information systems class for which I have an online test I need done. It will not let me attach all the material that is on the test but someone well versed

Subnet mask, Given the address 172.16.2.120 and the subnet mask of 255.255....

Given the address 172.16.2.120 and the subnet mask of 255.255.255.0. How many hosts are available? Ans) 172.16.2 120 is a standard Class B address with a subnet mask that permit

State some security models, State some Security Models The first and f...

State some Security Models The first and foremost thing one needs to do is to chalk out a security plan and policy based on any security model. The term security policy shall

Encrypted with a symmetric key, Alice sends a message to Bob, encrypted wit...

Alice sends a message to Bob, encrypted with a symmetric key. Bob decrypts the message and finds it is a purchase order for an expensive workstation. When the time comes to deliver

Calculate the peak-to-peak voltage of the signal, A multimeter is used to m...

A multimeter is used to measure a sinusoidal signal and reads 2V RMS; what is the peak-to-peak voltage of the signal? A mark will be deducted if you do not quote your answer to 2 s

Create the registration request that mh sends to fa, Assume a network as de...

Assume a network as depicted below with a home agent (HA), a foreign agent (FA), a mobile host (MH), and a remote host (RH). The dotted box is the home location of MH. Assume MH's

What are challenges of electronic commerce, Question 1: (a) In the con...

Question 1: (a) In the context of an information system, distinguish and relate among the terms: data, information and decision-making. (b) Describe at least two chall

Explain about star backbone network, Q. Explain about Star Backbone network...

Q. Explain about Star Backbone network? - Collapsed or switched backbone - Backbone is just one switch that connects LANs - Utilized as distribution backbone inside a bui

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd