Hardware difficulty of benz network, Computer Networking

Assignment Help:

Hardware difficulty of Benz Network:-

Benz network uses smaller switches and it gives excellent connectivity.  To find hardware difficulty of Benz network let us presume that

                                                     N = 2n     =>  n = log2 N

Number of phases in N input Benz network = 2n-1 = 2  log 2  N 

Number of 2Χ2 switches in each phase = N/2.

Overall number of cells in network = (N/2) (2 log2 N-1) = N log2  N- N / 2

Number of switches in different networks for a variety of inputs is given in the following table:

2          4          9          4

8          64        69        80

64        4096    1536    1408

256      65536  12888  7680

 

Therefore, we can examine from this above table that for higher inputs the Benz Network is the excellent as it has the smallest number of switches.

Shuffle Exchange Network:- These networks are based on the exchange operations and shuffle discussed previous.

 


Related Discussions:- Hardware difficulty of benz network

Illustrate nonboundary-level masking with example, Q. Illustrate Nonboundar...

Q. Illustrate Nonboundary-Level Masking with example? Nonboundary-Level Masking Example IP address 45 123 21 8 Mask 255 192 0 0 Subnet 45 64 0 0 123 0

Show the class A addresses, Q. Show the Class A Addresses? Class A Add...

Q. Show the Class A Addresses? Class A Addresses Numerically the lowest Use merely one byte to identify the class type and netid Three bytes are obtainable

Designing a network for a retail customer, You are designing a network for ...

You are designing a network for a retail customer; they plan to have 5 locations initially with the main store acting as the warehousing depot.  Within the next year they are plann

Pvm library routines, In this part we shall give a short description of the...

In this part we shall give a short description of the routines in the PVM 3 user library. Each PVM program should include the PVM header file "pvm3.h" (in a C program) or "fpvm3.h"

Mesh, Mesh It is of two dimensional network.  In this every processi...

Mesh It is of two dimensional network.  In this every processing elements are arranged in a two dimensional grid. The processor are in rows i and column j are denoted by PEi

Explain about twisted-pair cable, Q. Explain about Twisted-Pair Cable? ...

Q. Explain about Twisted-Pair Cable? - Two conductors surrounded by insulating material - One wire utilize to carry signals and other used as a ground reference - Twistin

Explain peer-to-peer networking model, Explain Peer-to-Peer Networking Mode...

Explain Peer-to-Peer Networking Model. A networking model where every workstation has equivalent capabilities and responsibilities is called as peer-to-peer model. There is no

Research, I have a research in this topic " Mitigating DoS Attacks against ...

I have a research in this topic " Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks " with simulation

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd