Hardware difficulty of benz network, Computer Networking

Assignment Help:

Hardware difficulty of Benz Network:-

Benz network uses smaller switches and it gives excellent connectivity.  To find hardware difficulty of Benz network let us presume that

                                                     N = 2n     =>  n = log2 N

Number of phases in N input Benz network = 2n-1 = 2  log 2  N 

Number of 2Χ2 switches in each phase = N/2.

Overall number of cells in network = (N/2) (2 log2 N-1) = N log2  N- N / 2

Number of switches in different networks for a variety of inputs is given in the following table:

2          4          9          4

8          64        69        80

64        4096    1536    1408

256      65536  12888  7680

 

Therefore, we can examine from this above table that for higher inputs the Benz Network is the excellent as it has the smallest number of switches.

Shuffle Exchange Network:- These networks are based on the exchange operations and shuffle discussed previous.

 


Related Discussions:- Hardware difficulty of benz network

Write the concept of simplex, Describe Concept of Simplex, Half Duplex and ...

Describe Concept of Simplex, Half Duplex and Full Duplex dialogs?

Snort deployed in the dmz network, Let's consider the network shown in Figu...

Let's consider the network shown in Figure 1 where Snort is deployed. In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? In Figure 1, say True or

Switch - network layer and routing , Switch Generally called  as two ...

Switch Generally called  as two  layer switch . it  performs  on physical  and data  link  layers. It  is  a bridge it has many  ports  that allow  better  performance. Since

Tools that an attacker can use to crack wep, Question: Consider that yo...

Question: Consider that you have to configure a small WLAN of 8 computers using Wired Equivalent Privacy (WEP) and that you have to best make use of its available security f

Show the model for network access security, Q. Show the Model for Network A...

Q. Show the Model for Network Access Security? Model for Network Access Security (1) Gatekeeper functions comprise Password-based login authentications. (2)

The forall statement, The FORALL Statement The FORALL statement allows ...

The FORALL Statement The FORALL statement allows for more common assignments to sections of an array. A FORALL statement has the general form.               FORALL ( triplet

Define retransmission, Define Retransmission? Retransmission is a proce...

Define Retransmission? Retransmission is a process in which the receiver detects the occurrence of an error and asks the sender to resend the message. Resending is repeated unt

Key components of inter-vlan routing , As configuring of VLANs helps in con...

As configuring of VLANs helps in controlling the size of broadcast domains. There are some key components of inter-VLAN routing such as VLAN capable switch Router Ro

What are diagrams and trigrams, What are Diagrams and Trigrams? The mos...

What are Diagrams and Trigrams? The most ordinary two letter combinations are known as diagrams. e.g. th, in, er, re and an. The most common three letter combinations are known

Explain the term- congestion, Explain the term- congestion The average ...

Explain the term- congestion The average queue size over the last cycle and the current cycle is calculated. This value is the threshold. By averaging over two cycles instead o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd