Question

In the Benes network B4 16 inputs are matched with 16 outputs. The network can send each input to...

In the Benes network B4 16 inputs are matched with 16 outputs. The network can send each input to either of two copies of B3 , which will be called the upper and lower copy. To have a congestion of 1 it is essential that any two inputs that differ by exactly 8 go to different copies of B3, and that any two packets with outputs that differ by exactly 8 also go to different copies of B3.

Consider the routing

Packet A B C D E F G H I J K L M N O P
Input 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Output 3 0 6 4 7 9 13 1 10 5 11 14 12 15 8 2

Here if packet A is sent to the upper copy of B3, then packet I must go to the lower copy (because the inputs differ by exactly 8), and packet K must go to the lower copy (because output 3 and output 11 have to be kept separate)

1) For each of the 16 inputs find the two packets that must be kept separate from it.

Packet A B C D E F G H I J K L M N O P
Input I
Output K

2) Draw a graph with vertices A through P, and edges connecting packets that must avoid each other. (Note this should be one or more cycles, so draw it to be easy to see)

3) Using the graph from above partition the packets into an upper and lower set that avoids all conflicts.

0 0
Add a comment Improve this question Transcribed image text
Know the answer?
Add Answer to:
In the Benes network B4 16 inputs are matched with 16 outputs. The network can send each input to...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • For A, B, and C start with a truth table, then use Algebraic simplification, and finally...

    For A, B, and C start with a truth table, then use Algebraic simplification, and finally use Quartus to design and plot the timing waveform. A four bit binary number is represented as Az A, AAo, where Ao is the LSB. Design a circuit that will produce a high whenever 4<A<10 where A represents the 4 bit input. A network router connects multiple computers together and allows them to send messages to each other. If two or more computers send...

  • C++ There are to be two console inputs to the program, as explained below. For each input, there is to be a default val...

    C++ There are to be two console inputs to the program, as explained below. For each input, there is to be a default value, so that the user can simply press ENTER to accept any default. (That means that string will be the best choice of data type for the console input for each option.) The two console inputs are the names of the input and output files. The default filenames are to be fileContainingEmails.txt for the input file, and...

  • Using C++, data structures, C++ STL, inputs and expected outputs are shown below. Max Heap Heap...

    Using C++, data structures, C++ STL, inputs and expected outputs are shown below. Max Heap Heap is a specialized tree-based data structure that satisfies the heap property: if P is a parent node of C, then the key (the value) of P is either > (in a max heap) or s (in a min heap) the key of C. The node at the "top" of the heap (with no parents) is called the root node. In binary-tree based heap, it...

  • Implement the following Python functions. These functions take advantage of the generalized Euclid's lemma to make...

    Implement the following Python functions. These functions take advantage of the generalized Euclid's lemma to make it possible to generate a random number within a specified range. Your implementations must be extremely efficient, and must handle very large inputs, as shown in the examples below. Implementations that perform exhaustive, exponential-time searches will receive no credit. a. Implement a function closest(t, ks) that takes two arguments: a target integer t and a list of integers ks. The function should return the...

  • 1. To which of the following subnets does IP address 225.3.2.22 belong? 225.3.2.0/24 225.3.2.22/24 225.2.3.0/24 225.0.0.0/24...

    1. To which of the following subnets does IP address 225.3.2.22 belong? 225.3.2.0/24 225.3.2.22/24 225.2.3.0/24 225.0.0.0/24 none of the above Question 2 On which of the following devices does the transport layer NOT run? laptop router cellphone A, B and C none of the above Question 3 What is the source address contained in the discover message sent by a host that is wanting to obtain an IP address? 255.255.255.255 0.0.0.0 the IP address of the server the last IP...

  • 1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80...

    1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT iptables -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT Allow web server traffic Block web server traffic Force port 80 traffic to port 443 Allow traffic from both 80 and 443 using UDP protocols 2. Timestamps are important because can not be changed or deleted by attackers when configured properly, allows you to correlate events across the network can always...

  • Could you please read 7483 data sheet and then answer number e 7383 Data Sheet 5483A...

    Could you please read 7483 data sheet and then answer number e 7383 Data Sheet 5483A 4-Bit Binary Full Adder with Fast Carry General Description The '83A high speed 4-bit binary full adders with internal carry lookahead accept two 4-bit binary words (Ao-A3, Bo- B3) and a Carry input (Co). They generate the binary Sum outputs (So-S3) and the Carry output (C4) from the most significant bit. They operate with either HIGH or active LOW operands (positive or negative logic)....

  • You may import the following library functions in your module: from fractions import gcd from math...

    You may import the following library functions in your module: from fractions import gcd from math import log from math import floor You may also use: • the .bit_length() method to efficiently obtain the bit length of an integer, • the abs() function for computing the absolute value of an integer, • and the // operator for integer division (you should avoid using / because it does not work for very large integers). Implement the following Python functions. These functions...

  • check my answers for Networking I came up with these answers, can check my answers Question...

    check my answers for Networking I came up with these answers, can check my answers Question 1: General What data rate is needed to transmit an uncompressed 4" x 6" photograph every second with a resolution of 1200 dots per inch and 24 bits per dot (pixel)? 691,200 kb/s 28.8 kb/s 8.29 Mb/s 829 Mb/s Question 2: Layering "Layering" is commonly used in computer networks because (check all that apply): -It forces all network software to be written in ‘C’....

  • Define a function called collapse() which takes a list as input. Each element of the list...

    Define a function called collapse() which takes a list as input. Each element of the list will either be an integer, or a list of integers. The function should modify the input list by replacing all of the elements which themselves are lists with the sum of their elements. For example: Test Result vals = [1, 2, 3, 4, 5] collapse(vals) print(vals) [1, 2, 3, 4, 5] vals = [1, [2, 3], 4, 5] collapse(vals) print(vals) [1, 5, 4, 5]...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT