Hardware difficulty of benz network, Computer Networking

Assignment Help:

Hardware difficulty of Benz Network:-

Benz network uses smaller switches and it gives excellent connectivity.  To find hardware difficulty of Benz network let us presume that

                                                     N = 2n     =>  n = log2 N

Number of phases in N input Benz network = 2n-1 = 2  log 2  N 

Number of 2Χ2 switches in each phase = N/2.

Overall number of cells in network = (N/2) (2 log2 N-1) = N log2  N- N / 2

Number of switches in different networks for a variety of inputs is given in the following table:

2          4          9          4

8          64        69        80

64        4096    1536    1408

256      65536  12888  7680

 

Therefore, we can examine from this above table that for higher inputs the Benz Network is the excellent as it has the smallest number of switches.

Shuffle Exchange Network:- These networks are based on the exchange operations and shuffle discussed previous.

 


Related Discussions:- Hardware difficulty of benz network

Determine the working of lan within a corporate network, Determine the work...

Determine the working of LAN within a corporate network It should be very clear right from the beginning that a firewall is not simply for protecting a corporate network from u

Source independence, Next hop to receiver does not relay on source of packe...

Next hop to receiver does not relay on source of packet. This phenomenon is known 'Source Independence'. It has various benefits. It gives efficient and fast routing. Packet switch

State the disadvantages of ring topology, Point out the disadvantages of Ri...

Point out the disadvantages of Ring Topology. The drawbacks of ring topologies are: a. It is considerably complex to install and reconfigure ring topology b. Media failur

How xor operations can implement key stream attacks, Question: a) In a...

Question: a) In a wireless network where WEP is enforced as security mechanism, what procedure would the network manager adopt for changing WEP default keys. b) Using Pla

Root, Originally Linux/UNIX systems had one all-powerful user called root t...

Originally Linux/UNIX systems had one all-powerful user called root that managed systems. Discuss the risks of having a single root user and how more limited management abilities c

What is the difference between csma/cd and csma/ca, What is the difference ...

What is the difference between CSMA/CD and CSMA/CA? CSMA/CD, or Collision Detect, retransmits data frames when a collision occurred. CSMA/CA, or Collision Avoidance, will first

What security risks present on the networks, Security risks present on the ...

Security risks present on the networks Lots of risks are present everywhere on Internet as well as on Intranet, if it is not known what is being done. Every day a number of

Simple mail transfer protocoland secure sockets layer, Simple Mail Transfer...

Simple Mail Transfer Protocoland Secure Sockets Layer SMTP: Simple Mail Transfer Protocol is a server-to-server protocol for delivering electronic mail. SSL: Secure Sockets

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd