Explain concept of permutation network, Computer Networking

Assignment Help:

Concept Of Permutation Network

In permutation interconnection networks the information transfer necessitates data transfer from input set of nodes to output set of nodes and potential connections between edges are set up by implementing several permutations in accessible links. There are several networks where multiple paths ranging from source to destination are probable.  For discovering the possible routes in these networks study of the permutation concept is a necessity.

Let us look at the basic concepts of permutation with respect to interconnection network.  Let us say the network has set of n input nodes and n output nodes.

Permutation P for a network of 5 nodes (i.e., n = 5) is written like this:

1585_Concept Of Permutation Network.png

It signifies node connections are 1↔5, 2↔4, 3↔1, 4↔3, 5↔2.

The connections are displayed in the Figure below.  

1354_Explain Concept Of Permutation Network.png

Figure: Node-Connections

The other permutation of the similar set of nodes can be 

2472_Explain Concept Of Permutation Network 1.png

That means connections are: 1↔2, 2↔3, 3↔5, 4↔1, and 5↔4 similarly other permutations are also possible.  The set of all permutations of a 3 node network would be


Related Discussions:- Explain concept of permutation network

Define the term - graphics interchange format, Define the term - Graphics I...

Define the term - Graphics Interchange Format A type of graphics file found frequently on the .net. A picture of a vice-president, for example, may appear on the Intranet as

Explain the communication channel threats, Q. Explain the Communication Cha...

Q. Explain the Communication Channel Threats? Secrecy Threat - Secrecy is the avoidance of unauthorized information disclosure - Privacy is the guard of individua

Explain the get and set snmp operations, Question 1 Explain the basic comm...

Question 1 Explain the basic communication model with its block diagram Question 2 List and explain the functions of network monitoring Question 3 Explain the get and se

Application layer - computer network, Application Layer The  applicati...

Application Layer The  application layer is where  network  applications and their  application layer protocols  reside. The internet application layer includes many protocols

State about the cell sectoring, State about the Cell sectoring With cel...

State about the Cell sectoring With cell sectoring, a cell is separated into a number of wedge-shaped sectors, each with its own set of channels, typically 3 or 6 sectors per c

How many cycles are lost for instruction accessing memory, 1.  A computer s...

1.  A computer system has a two-level memory cache hierarchy. The L1 cache has a zero hit penalty, a miss penalty of 5 ns and a hit rate of 95 percent. The L2 cache has a miss pena

Cipher password guess-cryptography, a. If a password to a cipher is exactly...

a. If a password to a cipher is exactly 8 characters long, and each character can be selected from [0-9], [a-z], and [A-Z], how many different passwords are possible? b. Suppose

Describe mail access protocols, Q. Describe Mail Access Protocols? Mai...

Q. Describe Mail Access Protocols? Mail Access Protocols - Used by receiver to retrieve mail when desired - Post Office Protocol, version 3 (POP3) is a simple limited

What is the mesh network, A network in which there is multiple network link...

A network in which there is multiple network links among computers to provide multiple paths for data to travel.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd