Hypercube network and properties, Computer Networking

Assignment Help:

Hypercube Network

The hypercube architecture has played a vital role in the development of parallel processing and is still not much popular and influential. The highly symmetric recursive structure of the hypercube supports several of elegant and efficient parallel algorithms. Hypercubes are also known as n-cubes, where n shows the number of dimensions. An- cube can be defined recursively as depicted below:

864_cube.png

                           3-cube built of 2 2-cubes

                                         193_4 cube.png

4-cube built of 2 3-cubes

 Properties of Hypercube:

  • A node p in a n-cube has a distinctive label, its binary ID, that is a n-bit binary number.
  • The labels of any two neighboring nodes vary in exactly 1 bit.
  • Two nodes whose labels vary in k bits are linked by a shortest path of length k.
  • Hypercube is both edge- symmetric and node.

Hypercube structure can be used to execute many parallel algorithms requiring all-to- all communication, that is, algorithms in which every task must communicate with every other task. This structure let a computation requiring all-to-all communication among P tasks to be performed in just log P steps compared t polynomial time using other data structures like linked lists and arrays.


Related Discussions:- Hypercube network and properties

Need for standards, Need for standards - Over the past couple of decade...

Need for standards - Over the past couple of decades several of the networks that were built used different hardware and software implementations therefore they were incompatib

What is sap, What is SAP? Series of interface points that permit other ...

What is SAP? Series of interface points that permit other computers to interact with the other layers of network protocol stack is known as SAP.

What is subnet mask, What is subnet mask? A subnet mask is combined wit...

What is subnet mask? A subnet mask is combined with an IP address in order to recognize two parts: the extended network address and the host address. Such as an IP address, a s

Explain the importance of authentication, Explain the importance of authent...

Explain the importance of authentication. Authentication is the method of verifying a user's credentials before he can log into the network. It is normally performed using a us

Explain token passing -token ring, Token Passing - Token Ring (IEEE 802.5) ...

Token Passing - Token Ring (IEEE 802.5) Needs that station take turns sending data Token passing coordinates process Token is a especially formatted three-byte fr

Explain the types of security threats, Q. Explain the types of Security Thr...

Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut

Checksum - transport layer, Checksum This 16 bits field contain  th...

Checksum This 16 bits field contain  the checksum. The  calculation of the   checksum for TCP follows  the same  procedure as the  described for  UDP. However the inclusion

What does the user datagram protocol (udp) , UDP is connectionless, and doe...

UDP is connectionless, and does not give error checking. But remember, error checking can happen at other layers too.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd