Explain hyper cube interconnection networks, Computer Networking

Assignment Help:

Hyper Cube: A Hypercube interconnection network is an expansion of cube network. For n=3, Hypercube interconnection network may be described recursively in this manner: 

For n = 3, it cube network in that nodes are allocated number 0, 1, ......,7 in binary. In different way, one of the nodes is allocated a label 000, another one as 001.... and the final node as 111. Then whichever node can communicate with another node if their labels vary in accurately one place, for example the node with label 101 can communicate straight with 001, 000 and 111.

For n > 3, a hypercube may be described recursively in this manner:

Take two hyper cubes of dimension (n - 1) every having (n -1) bits labels as 00....0, ......11.....1 

Next link the two nodes having similar labels each (n - 1) dimension hypercubes and link these nodes. Next prefix "1" the labels of one of the (n - 1) dimensional hypercube and "0" to labels of other hypercube. This entirely completes the structure of n-dimensional hypercube. Straight/Direct connection is just between that pair of nodes that has a (solid) line associating the two nodes in pair.

For n = 4 we draw 4-dimensional hypercube as displayed in Figure:

 

1949_Explain Hyper Cube Interconnection Networks.png

 

Figure: 4-Dimensional hypercube


Related Discussions:- Explain hyper cube interconnection networks

Show the application layer responsibilities, Q. Show the Application Layer ...

Q. Show the Application Layer Responsibilities? - Make possible user access to the network - User interfaces as well as support for services such as E-Mail File

What is fiber distributed data interface, FDDI -(Fiber Distributed Data Int...

FDDI -(Fiber Distributed Data Interface) FDDI Basics: FDDI (Fiber Distributed Data Interface) came about because system managers became concerned with network reliability i

What is dos, What is DoS? A do, or Denial-of-Service attack, is an atte...

What is DoS? A do, or Denial-of-Service attack, is an attempt to stop users from being able to access the internet or any other network services. Such attacks might be come in

Define what is a software agent, QUESTION (a) Define what is a software...

QUESTION (a) Define what is a software agent? (b) An intelligent agent is known to exhibit several characteristics or properties that distinguish it from another piece of so

Determine the load and throughput in slotted aloha system, In slotted Aloha...

In slotted Aloha system, it has been measured that 70% of slots are occupied by frames (i.e. the remaining slots are empty).  a)  How many frames need to be transmitted, on aver

Diiferentiate between html and http, Diiferentiate between HTML and HTTP ...

Diiferentiate between HTML and HTTP Hypertext Markup Language (HTML) The language used in writing pages for the World Wide Web. Knowledge of not HTML is not necessary f

Method of ip multicasting or multicast ip address, Can you describe the con...

Can you describe the concept of IP multicasting or multicast IP address?

Snort deployed in the dmz network, Let's consider the network shown in Figu...

Let's consider the network shown in Figure 1 where Snort is deployed. In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? In Figure 1, say True or

What are some drawbacks of implementing a ring topology, What are some draw...

What are some drawbacks of implementing a ring topology? In case one workstation on the network varies a malfunction, it can bring down the whole network. Another drawback is t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd