Hyper cube, Computer Networking

Hyper Cube

A Hypercube interconnection network is increament  of cube network. Hypercube interconnection network for n ≥ 3, can be distinct recursively as follow:

For n = 3, it cube network in which nodes are allocted number 0, 1, ......,7 in binary. In other words, one of the nodes is allocated a label 000, another one as 001.... And the final node as 111.

Then one node can communicate with one other node if their labels vary in exactly one place, e.g., the node with label 101 might communicate directly with 001, 000 and 111.

For n > 3, a hypercube can be described recursively as follows:

Take two hypercubes of dimension (n - 1) each having (n -1) bits labels as 00....0,

......11.....1

Next join the two nodes having similar labels each (n - 1) -dimension hypercubes and connect these nodes. Next prefix „1? the labels of one of the (n - 1) dimensional hypercube and „0? to the labels of the other hypercube. This entire the structure of n-dimensional hypercube. Direct connection is only among that pair of nodes which has a (solid) line linking the two nodes in the pair.

For n = 4 we draw 4-dimensional hypercube as show in Figure 12:

                          1516_Hyper Cube.png

Posted Date: 3/2/2013 5:52:59 AM | Location : United States







Related Discussions:- Hyper cube, Assignment Help, Ask Question on Hyper cube, Get Answer, Expert's Help, Hyper cube Discussions

Write discussion on Hyper cube
Your posts are moderated
Related Questions
THICK ETHERNET WIRING:  It needs thick coax cable. AUI cable joins from NIC to transceiver. AUI cable take digital signal from NIC to transceiver. The transceiver creates anal

Most networks give dynamic connections, which last for a relatively short period. To operate this, ATM can dynamically join a switched virtual circuit (SVC), allow it last as long

What is the advantage of address sharing? By using address translation instead of routing, address sharing gives an inherent security benefit. That's because host PCs on the In

Q. Explain the Communication Channel Threats? Secrecy Threat - Secrecy is the avoidance of unauthorized information disclosure - Privacy is the guard of individua

What everyday object is the same as The RAM function to the computer?

Question: a) (i) Describe the entire process of credit card processing, identifying the different steps and parties involved. (ii) What are the roles of the acquiring ban

Firewall The NAT router allows receiving of number of a data streams. If it receives a transmission in the form of acknowledgement or data streams or error responses from an ex

Differentiate between Fast fading and Slow fading Fast fading refers to changes in signal strength among a transmitter and receiver as the distance among the two changes by a s

Question 1 Who initiates the ‘Trap' message? When is this message generated? Question 2 Discuss the features of a typical Network Management System.List (Fault Management,

The marketing term 'ISDN modem' was formed to help sell the ISDN idea to America. There is no such thing as an analog modulator demodulator for digital ISDN. The Terminal Adapter (