Explain concept of permutation network, Computer Networking

Assignment Help:

Concept Of Permutation Network

In permutation interconnection networks the information transfer necessitates data transfer from input set of nodes to output set of nodes and potential connections between edges are set up by implementing several permutations in accessible links. There are several networks where multiple paths ranging from source to destination are probable.  For discovering the possible routes in these networks study of the permutation concept is a necessity.

Let us look at the basic concepts of permutation with respect to interconnection network.  Let us say the network has set of n input nodes and n output nodes.

Permutation P for a network of 5 nodes (i.e., n = 5) is written like this:

1585_Concept Of Permutation Network.png

It signifies node connections are 1↔5, 2↔4, 3↔1, 4↔3, 5↔2.

The connections are displayed in the Figure below.  

1354_Explain Concept Of Permutation Network.png

Figure: Node-Connections

The other permutation of the similar set of nodes can be 

2472_Explain Concept Of Permutation Network 1.png

That means connections are: 1↔2, 2↔3, 3↔5, 4↔1, and 5↔4 similarly other permutations are also possible.  The set of all permutations of a 3 node network would be


Related Discussions:- Explain concept of permutation network

Create a client and a server - message queues & socket, Lab will require yo...

Lab will require you to create a client and a server that communicate over either message queues, sockets, or a well known fifo. The data passed will be a simple request/response i

How is computer networks used in marketing and sales, How is computer netwo...

How is computer networks used in marketing and sales, financial services, teleconferencing? Computer network have led to a new age of all of these services. They have helped in

Classless addressing over classfull addressing scheme, What is the benefit ...

What is the benefit of using classless addressing over classfull addressing scheme?

Causes of failures, CAUSES OF FAILURES Every failure has a well-define...

CAUSES OF FAILURES Every failure has a well-defined cause.  Any system or device has an inherent strength or capacity to resist failures. This depends on design, material, man

What are different ways of securing a computer network, What are different ...

What are different ways of securing a computer network? There are lots of ways to do this. Install reliable and updated anti-virus program on all computers. Make sure firewalls

Categories of encryption - decryption, Q. Categories of Encryption - Decryp...

Q. Categories of Encryption - Decryption ? Categories of Encryption/Decryption - Symmetric-key - encryption key (Ke) and the decryption key (Kd) are the same and secret

Clos network, Clos network This network was organized by Clos (1953).  ...

Clos network This network was organized by Clos (1953).  It is a non-blocking network and gives full connectivity like crossbar network but it also requires significantly minim

How does a token-passing protocol works, How does a Token-Passing Protocol ...

How does a Token-Passing Protocol works? The token-passing protocol relies on a control signal known as the token. A token is a 24-bit packet that circulates throughout the net

Explain pipeline processing, Pipeline Processing Pipelining is a scheme...

Pipeline Processing Pipelining is a scheme to realize, overlapped parallelism in the proposed way out of a problem on a digital computer in an economical way. To understand the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd