Hardware difficulty of benz network, Computer Networking

Assignment Help:

Hardware difficulty of Benz Network:-

Benz network uses smaller switches and it gives excellent connectivity.  To find hardware difficulty of Benz network let us presume that

                                                     N = 2n     =>  n = log2 N

Number of phases in N input Benz network = 2n-1 = 2  log 2  N 

Number of 2Χ2 switches in each phase = N/2.

Overall number of cells in network = (N/2) (2 log2 N-1) = N log2  N- N / 2

Number of switches in different networks for a variety of inputs is given in the following table:

2          4          9          4

8          64        69        80

64        4096    1536    1408

256      65536  12888  7680

 

Therefore, we can examine from this above table that for higher inputs the Benz Network is the excellent as it has the smallest number of switches.

Shuffle Exchange Network:- These networks are based on the exchange operations and shuffle discussed previous.

 


Related Discussions:- Hardware difficulty of benz network

Illustrate about OSI architecture, Explain ISO's OSI Architecture The O...

Explain ISO's OSI Architecture The Open System Interconnection (OSI) is a standard reference model for communication among two end users in a network. It is used in developing

System - network administrator, The program must be well documented which i...

The program must be well documented which includes meaningful variable and subroutine names ("self documenting code") along with comments in the code. The following block of code w

Explain the term - primary memory and hard disk, Explain the term - primary...

Explain the term - primary memory and hard disk A peculiar situation arises when the existing server arrives at a stage when it cannot handle the requests quickly and most of i

Authentication mechanism in vpn, What are the dissimilar ways authenticatio...

What are the dissimilar ways authentication mechanism in VPN?

What are intrusion detection systems, Question : a) Give three example...

Question : a) Give three examples of vulnerable services which are among the overwhelming majority of successful attacks. b) Name the five outside sources which can be the

Advantage of repeaters, Advantage of Repeaters Repeaters provide  the ...

Advantage of Repeaters Repeaters provide  the  advantage of increasing type size  of LAN or connecting LAN  segments. Repeater can overcome 10  base 5 Ethernet LANM restrictio

What is data representation, Q. What is Data Representation? Informatio...

Q. What is Data Representation? Information Today arrives in different forms such as numbers, text, images, audio and video. Text: Represented like a bit pattern a sequence

Http is stateless - discuss this statement, Question : (a) Describe, w...

Question : (a) Describe, with the aid of a diagram, a hybrid topology of a network of your choice. (b) Briefly explain the similarity and differences between a switch and

What is the multicast routing, Sending a message to a group multicast addre...

Sending a message to a group multicast address is known as multicasting, and its routing algorithm is known as multicast routing.

Define the network security, Q. Define the Network Security? The Intern...

Q. Define the Network Security? The Internet and Web technology presents enormous promise for e-commerce. Web now is used to handle important business assets that became the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd