SlideShare a Scribd company logo
Butterfly Network
Essentials
• Number of Nodes = (K+1)*2^K
• Number of Ranks = K+1 (Starts from zero)
• Network Diameter = 2*K
• Bisection Width= 2^K
• If K=3 Then
• Number of Nodes = (3+1)*2^3 = 32
• Number of Ranks = 3+1 = 4
• Network Diameter = 2*3 = 6
• Bisection Width= 2^3 = 8
Nodes and Ranks
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
Connections
• Node (i,j) connected to Node (i-1,j) and (i-1,M) where i>0.
• “i” is the Rank
• “j” is the node
• “M” is the inverted bit on ith location of j
Connections
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
Connection for j=000 where i=1
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (1-1, 000) = (0,000)
(i-1,M) = (1-1, 000) = (0,100)
Connection for j=001 where i=1
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (1-1, 001) = (0,001)
(i-1,M) = (1-1, 001) = (0,101)
Connection for j=010 where i=1
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (1-1, 010) = (0,010)
(i-1,M) = (1-1, 010) = (0,110)
Connection for j=011 where i=1
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (1-1, 011) = (0,011)
(i-1,M) = (1-1, 011) = (0,111)
Connection for j=100 where i=1
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (1-1, 100) = (0,100)
(i-1,M) = (1-1, 100) = (0,000)
Connection for j=101 where i=1
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (1-1, 101) = (0,101)
(i-1,M) = (1-1, 101) = (0,001)
Connection for j=110 where i=1
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (1-1, 110) = (0,110)
(i-1,M) = (1-1, 110) = (0,010)
Connection for j=111 where i=1
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (1-1, 111) = (0,111)
(i-1,M) = (1-1, 111) = (0,011)
Connection for j=000 where i=2
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (2-1, 000) = (1,000)
(i-1,M) = (2-1, 000) = (1,010)
Connection for j=001 where i=2
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (2-1, 001) = (1,001)
(i-1,M) = (2-1, 001) = (1,011)
Connection for j=010 where i=2
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (2-1, 010) = (1,010)
(i-1,M) = (2-1, 010) = (1,000)
Connection for j=011 where i=2
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (2-1, 011) = (1,011)
(i-1,M) = (2-1, 011) = (1,001)
Connection for j=100 where i=2
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (2-1, 100) = (1,100)
(i-1,M) = (2-1, 100) = (1,110)
Connection for j=101 where i=2
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (2-1, 101) = (1,101)
(i-1,M) = (2-1, 101) = (1,111)
Connection for j=110 where i=2
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (2-1, 110) = (1,110)
(i-1,M) = (2-1, 110) = (1,100)
Connection for j=110 where i=2
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (2-1, 111) = (1,111)
(i-1,M) = (2-1, 111) = (1,101)
Connection for j=000 where i=3
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (3-1, 000) = (2,000)
(i-1,M) = (3-1, 000) = (2,001)
Connection for j=001 where i=3
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (3-1, 001) = (2,001)
(i-1,M) = (3-1, 001) = (2,000)
Connection for j=010 where i=3
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (3-1, 010) = (2,010)
(i-1,M) = (3-1, 010) = (2,011)
Connection for j=011 where i=3
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (3-1, 011) = (2,011)
(i-1,M) = (3-1, 011) = (2,010)
Connection for j=100 where i=3
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (3-1, 100) = (2,100)
(i-1,M) = (3-1, 100) = (2,101)
Connection for j=101 where i=3
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (3-1, 101) = (2,101)
(i-1,M) = (3-1, 101) = (2,100)
Connection for j=110 where i=3
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (3-1, 110) = (2,110)
(i-1,M) = (3-1, 110) = (2,111)
Connection for j=111 where i=3
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
(i-1,j) = (3-1, 111) = (2,111)
(i-1,M) = (3-1, 111) = (2,110)
Paths
• To go node (0, j1) to (K, j2)
• Take j2
• If bit is 0 take left link
• If bit is 1 take right link
• If left or right is not possible take straight
Path between 000 and 111
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
J1 = 000 to j2 = 111
Path
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
J1 = 000 to j2 = 111
1st bit 1 take right
Path
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
J1 = 000 to j2 = 111
1st bit 1 take right
2nd bit 1 take right
Path
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
J1 = 000 to j2 = 111
1st bit 1 take right
2nd bit 1 take right
3rd bit 1 take right
Path
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
J1 = 001 to j2 = 110
1st bit 1 take right
2nd bit 1 take right
3rd bit 0 take left
Path
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
J1 = 010 to j2 = 101
1st bit 1 take right
2nd bit 0 take left
3rd bit 1 take right
Path
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
J1 = 011 to j2 = 100
1st bit 1 take right
2nd bit 0 take left
3rd bit 0 take left
Path
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
J1 = 100 to j2 = 000
1st bit 0 take left
2nd bit 0 take straight
3rd bit 0 take straight
Path
Rank 0
Rank 1
Rank 2
Rank 3
000 001 010 011 100 101 110 111
J1 = 101 to j2 = 011
1st bit 0 take left
2nd bit 1 take right
3rd bit 1 take straight

More Related Content

What's hot

Transport layer
Transport layer Transport layer
Transport layer
Mukesh Chinta
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Dr. SELVAGANESAN S
 
CRC JAVA CODE
CRC JAVA CODECRC JAVA CODE
CRC JAVA CODE
sandeep101026
 
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Selvaraj Seerangan
 
Distributed System ppt
Distributed System pptDistributed System ppt
Transport services
Transport servicesTransport services
Transport services
Navin Kumar
 
Trends in distributed systems
Trends in distributed systemsTrends in distributed systems
Trends in distributed systems
Jayanthi Radhakrishnan
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
Alagappa Govt Arts College, Karaikudi
 
Distributed Systems Real Life Applications
Distributed Systems Real Life ApplicationsDistributed Systems Real Life Applications
Distributed Systems Real Life Applications
Aman Srivastava
 
Leaky bucket A
Leaky bucket ALeaky bucket A
Leaky bucket A
Syed Shaheer Gilani
 
Complexity of Algorithm
Complexity of AlgorithmComplexity of Algorithm
Complexity of Algorithm
Muhammad Muzammal
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
Ramola Dhande
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems
Dr Sandeep Kumar Poonia
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
selvakumar_b1985
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
Kathirvel Ayyaswamy
 
Error control
Error controlError control
Error control
selvakumar_b1985
 
Target language in compiler design
Target language in compiler designTarget language in compiler design
Target language in compiler design
Muhammad Haroon
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
Mahesh Kumar Chelimilla
 
Daa notes 3
Daa notes 3Daa notes 3
Daa notes 3
smruti sarangi
 

What's hot (20)

Transport layer
Transport layer Transport layer
Transport layer
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
CRC JAVA CODE
CRC JAVA CODECRC JAVA CODE
CRC JAVA CODE
 
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
 
Distributed System ppt
Distributed System pptDistributed System ppt
Distributed System ppt
 
Transport services
Transport servicesTransport services
Transport services
 
Trends in distributed systems
Trends in distributed systemsTrends in distributed systems
Trends in distributed systems
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
 
Distributed Systems Real Life Applications
Distributed Systems Real Life ApplicationsDistributed Systems Real Life Applications
Distributed Systems Real Life Applications
 
Leaky bucket A
Leaky bucket ALeaky bucket A
Leaky bucket A
 
Complexity of Algorithm
Complexity of AlgorithmComplexity of Algorithm
Complexity of Algorithm
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Error control
Error controlError control
Error control
 
Target language in compiler design
Target language in compiler designTarget language in compiler design
Target language in compiler design
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Daa notes 3
Daa notes 3Daa notes 3
Daa notes 3
 

More from Syed Zaid Irshad

Operating System.pdf
Operating System.pdfOperating System.pdf
Operating System.pdf
Syed Zaid Irshad
 
DBMS_Lab_Manual_&_Solution
DBMS_Lab_Manual_&_SolutionDBMS_Lab_Manual_&_Solution
DBMS_Lab_Manual_&_Solution
Syed Zaid Irshad
 
Data Structure and Algorithms.pptx
Data Structure and Algorithms.pptxData Structure and Algorithms.pptx
Data Structure and Algorithms.pptx
Syed Zaid Irshad
 
Design and Analysis of Algorithms.pptx
Design and Analysis of Algorithms.pptxDesign and Analysis of Algorithms.pptx
Design and Analysis of Algorithms.pptx
Syed Zaid Irshad
 
Professional Issues in Computing
Professional Issues in ComputingProfessional Issues in Computing
Professional Issues in Computing
Syed Zaid Irshad
 
Reduce course notes class xi
Reduce course notes class xiReduce course notes class xi
Reduce course notes class xi
Syed Zaid Irshad
 
Reduce course notes class xii
Reduce course notes class xiiReduce course notes class xii
Reduce course notes class xii
Syed Zaid Irshad
 
Introduction to Database
Introduction to DatabaseIntroduction to Database
Introduction to Database
Syed Zaid Irshad
 
C Language
C LanguageC Language
C Language
Syed Zaid Irshad
 
Flowchart
FlowchartFlowchart
Flowchart
Syed Zaid Irshad
 
Algorithm Pseudo
Algorithm PseudoAlgorithm Pseudo
Algorithm Pseudo
Syed Zaid Irshad
 
Computer Programming
Computer ProgrammingComputer Programming
Computer Programming
Syed Zaid Irshad
 
ICS 2nd Year Book Introduction
ICS 2nd Year Book IntroductionICS 2nd Year Book Introduction
ICS 2nd Year Book Introduction
Syed Zaid Irshad
 
Security, Copyright and the Law
Security, Copyright and the LawSecurity, Copyright and the Law
Security, Copyright and the Law
Syed Zaid Irshad
 
Computer Architecture
Computer ArchitectureComputer Architecture
Computer Architecture
Syed Zaid Irshad
 
Data Communication
Data CommunicationData Communication
Data Communication
Syed Zaid Irshad
 
Information Networks
Information NetworksInformation Networks
Information Networks
Syed Zaid Irshad
 
Basic Concept of Information Technology
Basic Concept of Information TechnologyBasic Concept of Information Technology
Basic Concept of Information Technology
Syed Zaid Irshad
 
Introduction to ICS 1st Year Book
Introduction to ICS 1st Year BookIntroduction to ICS 1st Year Book
Introduction to ICS 1st Year Book
Syed Zaid Irshad
 
Using the set operators
Using the set operatorsUsing the set operators
Using the set operators
Syed Zaid Irshad
 

More from Syed Zaid Irshad (20)

Operating System.pdf
Operating System.pdfOperating System.pdf
Operating System.pdf
 
DBMS_Lab_Manual_&_Solution
DBMS_Lab_Manual_&_SolutionDBMS_Lab_Manual_&_Solution
DBMS_Lab_Manual_&_Solution
 
Data Structure and Algorithms.pptx
Data Structure and Algorithms.pptxData Structure and Algorithms.pptx
Data Structure and Algorithms.pptx
 
Design and Analysis of Algorithms.pptx
Design and Analysis of Algorithms.pptxDesign and Analysis of Algorithms.pptx
Design and Analysis of Algorithms.pptx
 
Professional Issues in Computing
Professional Issues in ComputingProfessional Issues in Computing
Professional Issues in Computing
 
Reduce course notes class xi
Reduce course notes class xiReduce course notes class xi
Reduce course notes class xi
 
Reduce course notes class xii
Reduce course notes class xiiReduce course notes class xii
Reduce course notes class xii
 
Introduction to Database
Introduction to DatabaseIntroduction to Database
Introduction to Database
 
C Language
C LanguageC Language
C Language
 
Flowchart
FlowchartFlowchart
Flowchart
 
Algorithm Pseudo
Algorithm PseudoAlgorithm Pseudo
Algorithm Pseudo
 
Computer Programming
Computer ProgrammingComputer Programming
Computer Programming
 
ICS 2nd Year Book Introduction
ICS 2nd Year Book IntroductionICS 2nd Year Book Introduction
ICS 2nd Year Book Introduction
 
Security, Copyright and the Law
Security, Copyright and the LawSecurity, Copyright and the Law
Security, Copyright and the Law
 
Computer Architecture
Computer ArchitectureComputer Architecture
Computer Architecture
 
Data Communication
Data CommunicationData Communication
Data Communication
 
Information Networks
Information NetworksInformation Networks
Information Networks
 
Basic Concept of Information Technology
Basic Concept of Information TechnologyBasic Concept of Information Technology
Basic Concept of Information Technology
 
Introduction to ICS 1st Year Book
Introduction to ICS 1st Year BookIntroduction to ICS 1st Year Book
Introduction to ICS 1st Year Book
 
Using the set operators
Using the set operatorsUsing the set operators
Using the set operators
 

Recently uploaded

Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
Madan Karki
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 

Recently uploaded (20)

Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 

Butterfly network

  • 2. Essentials • Number of Nodes = (K+1)*2^K • Number of Ranks = K+1 (Starts from zero) • Network Diameter = 2*K • Bisection Width= 2^K • If K=3 Then • Number of Nodes = (3+1)*2^3 = 32 • Number of Ranks = 3+1 = 4 • Network Diameter = 2*3 = 6 • Bisection Width= 2^3 = 8
  • 3. Nodes and Ranks Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111
  • 4. Connections • Node (i,j) connected to Node (i-1,j) and (i-1,M) where i>0. • “i” is the Rank • “j” is the node • “M” is the inverted bit on ith location of j
  • 5. Connections Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111
  • 6. Connection for j=000 where i=1 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (1-1, 000) = (0,000) (i-1,M) = (1-1, 000) = (0,100)
  • 7. Connection for j=001 where i=1 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (1-1, 001) = (0,001) (i-1,M) = (1-1, 001) = (0,101)
  • 8. Connection for j=010 where i=1 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (1-1, 010) = (0,010) (i-1,M) = (1-1, 010) = (0,110)
  • 9. Connection for j=011 where i=1 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (1-1, 011) = (0,011) (i-1,M) = (1-1, 011) = (0,111)
  • 10. Connection for j=100 where i=1 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (1-1, 100) = (0,100) (i-1,M) = (1-1, 100) = (0,000)
  • 11. Connection for j=101 where i=1 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (1-1, 101) = (0,101) (i-1,M) = (1-1, 101) = (0,001)
  • 12. Connection for j=110 where i=1 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (1-1, 110) = (0,110) (i-1,M) = (1-1, 110) = (0,010)
  • 13. Connection for j=111 where i=1 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (1-1, 111) = (0,111) (i-1,M) = (1-1, 111) = (0,011)
  • 14. Connection for j=000 where i=2 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (2-1, 000) = (1,000) (i-1,M) = (2-1, 000) = (1,010)
  • 15. Connection for j=001 where i=2 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (2-1, 001) = (1,001) (i-1,M) = (2-1, 001) = (1,011)
  • 16. Connection for j=010 where i=2 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (2-1, 010) = (1,010) (i-1,M) = (2-1, 010) = (1,000)
  • 17. Connection for j=011 where i=2 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (2-1, 011) = (1,011) (i-1,M) = (2-1, 011) = (1,001)
  • 18. Connection for j=100 where i=2 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (2-1, 100) = (1,100) (i-1,M) = (2-1, 100) = (1,110)
  • 19. Connection for j=101 where i=2 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (2-1, 101) = (1,101) (i-1,M) = (2-1, 101) = (1,111)
  • 20. Connection for j=110 where i=2 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (2-1, 110) = (1,110) (i-1,M) = (2-1, 110) = (1,100)
  • 21. Connection for j=110 where i=2 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (2-1, 111) = (1,111) (i-1,M) = (2-1, 111) = (1,101)
  • 22. Connection for j=000 where i=3 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (3-1, 000) = (2,000) (i-1,M) = (3-1, 000) = (2,001)
  • 23. Connection for j=001 where i=3 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (3-1, 001) = (2,001) (i-1,M) = (3-1, 001) = (2,000)
  • 24. Connection for j=010 where i=3 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (3-1, 010) = (2,010) (i-1,M) = (3-1, 010) = (2,011)
  • 25. Connection for j=011 where i=3 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (3-1, 011) = (2,011) (i-1,M) = (3-1, 011) = (2,010)
  • 26. Connection for j=100 where i=3 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (3-1, 100) = (2,100) (i-1,M) = (3-1, 100) = (2,101)
  • 27. Connection for j=101 where i=3 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (3-1, 101) = (2,101) (i-1,M) = (3-1, 101) = (2,100)
  • 28. Connection for j=110 where i=3 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (3-1, 110) = (2,110) (i-1,M) = (3-1, 110) = (2,111)
  • 29. Connection for j=111 where i=3 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 (i-1,j) = (3-1, 111) = (2,111) (i-1,M) = (3-1, 111) = (2,110)
  • 30. Paths • To go node (0, j1) to (K, j2) • Take j2 • If bit is 0 take left link • If bit is 1 take right link • If left or right is not possible take straight
  • 31. Path between 000 and 111 Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 J1 = 000 to j2 = 111
  • 32. Path Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 J1 = 000 to j2 = 111 1st bit 1 take right
  • 33. Path Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 J1 = 000 to j2 = 111 1st bit 1 take right 2nd bit 1 take right
  • 34. Path Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 J1 = 000 to j2 = 111 1st bit 1 take right 2nd bit 1 take right 3rd bit 1 take right
  • 35. Path Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 J1 = 001 to j2 = 110 1st bit 1 take right 2nd bit 1 take right 3rd bit 0 take left
  • 36. Path Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 J1 = 010 to j2 = 101 1st bit 1 take right 2nd bit 0 take left 3rd bit 1 take right
  • 37. Path Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 J1 = 011 to j2 = 100 1st bit 1 take right 2nd bit 0 take left 3rd bit 0 take left
  • 38. Path Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 J1 = 100 to j2 = 000 1st bit 0 take left 2nd bit 0 take straight 3rd bit 0 take straight
  • 39. Path Rank 0 Rank 1 Rank 2 Rank 3 000 001 010 011 100 101 110 111 J1 = 101 to j2 = 011 1st bit 0 take left 2nd bit 1 take right 3rd bit 1 take straight