Explain hyper cube interconnection networks, Computer Networking

Assignment Help:

Hyper Cube: A Hypercube interconnection network is an expansion of cube network. For n=3, Hypercube interconnection network may be described recursively in this manner: 

For n = 3, it cube network in that nodes are allocated number 0, 1, ......,7 in binary. In different way, one of the nodes is allocated a label 000, another one as 001.... and the final node as 111. Then whichever node can communicate with another node if their labels vary in accurately one place, for example the node with label 101 can communicate straight with 001, 000 and 111.

For n > 3, a hypercube may be described recursively in this manner:

Take two hyper cubes of dimension (n - 1) every having (n -1) bits labels as 00....0, ......11.....1 

Next link the two nodes having similar labels each (n - 1) dimension hypercubes and link these nodes. Next prefix "1" the labels of one of the (n - 1) dimensional hypercube and "0" to labels of other hypercube. This entirely completes the structure of n-dimensional hypercube. Straight/Direct connection is just between that pair of nodes that has a (solid) line associating the two nodes in pair.

For n = 4 we draw 4-dimensional hypercube as displayed in Figure:

 

1949_Explain Hyper Cube Interconnection Networks.png

 

Figure: 4-Dimensional hypercube


Related Discussions:- Explain hyper cube interconnection networks

Show the error detection- check sum, Error Detection- Check Sum Th...

Error Detection- Check Sum The Checksum generator are subdivides the data unit into equal segments of "n" bits (usually 16) These segments are added utilizing one's c

Receipt of acknowledgment - transport layer, Receipt of Acknowledgment ...

Receipt of Acknowledgment In our GBN  protocols  an acknowledgment for  packet with sequence number will be taken to be accumulative acknowledgment  indicating that all  packe

ppp error detection on cisco routers , Which form of PPP error detection o...

Which form of PPP error detection on Cisco routers monitors data dropped on a link?  Ans) The Quality protocol monitors data dropped on a link. Magic Number avoids frame looping

What are the threats include in computer software, What are the threats inc...

What are the threats include in computer software The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to

Process switching and fast switching, Process Switching It applies the...

Process Switching It applies the brute force method to switch packets wih consumption of large amount of CPU time List of items are needed when switching packets Routing

Explain about the cell splitting, Cell splitting  In practice, the dist...

Cell splitting  In practice, the distribution of traffic and topographic features is not uniform, and this shows opportunities of capacity enhance. Cells in areas of high usage

The ip addressing scheme, An Internet address (IP address) is a unique 32-b...

An Internet address (IP address) is a unique 32-bit binary number given to a host and used for all interaction with the host. Each packet transmit across an Internet contains the 3

Local and wide area networking, A. Current setting A new bank has its he...

A. Current setting A new bank has its headquarters located in City A. Recently, the bank has opened its first branch in City B, and its data centre in City C. The three cities a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd