Explain hyper cube interconnection networks, Computer Networking

Assignment Help:

Hyper Cube: A Hypercube interconnection network is an expansion of cube network. For n=3, Hypercube interconnection network may be described recursively in this manner: 

For n = 3, it cube network in that nodes are allocated number 0, 1, ......,7 in binary. In different way, one of the nodes is allocated a label 000, another one as 001.... and the final node as 111. Then whichever node can communicate with another node if their labels vary in accurately one place, for example the node with label 101 can communicate straight with 001, 000 and 111.

For n > 3, a hypercube may be described recursively in this manner:

Take two hyper cubes of dimension (n - 1) every having (n -1) bits labels as 00....0, ......11.....1 

Next link the two nodes having similar labels each (n - 1) dimension hypercubes and link these nodes. Next prefix "1" the labels of one of the (n - 1) dimensional hypercube and "0" to labels of other hypercube. This entirely completes the structure of n-dimensional hypercube. Straight/Direct connection is just between that pair of nodes that has a (solid) line associating the two nodes in pair.

For n = 4 we draw 4-dimensional hypercube as displayed in Figure:

 

1949_Explain Hyper Cube Interconnection Networks.png

 

Figure: 4-Dimensional hypercube


Related Discussions:- Explain hyper cube interconnection networks

Ethernet framing is used for tcp/ip, Which type of Ethernet framing is used...

Which type of Ethernet framing is used for TCP/IP and AppleTalk Ans)Ethernet SNAP

Permutation representation through matrix, Q. Permutation representation th...

Q. Permutation representation through Matrix? Figure: Clos Network The functioning of this above permutation is displayed in Figure. This permutation is able to

What is dos, What is DoS? A do, or Denial-of-Service attack, is an atte...

What is DoS? A do, or Denial-of-Service attack, is an attempt to stop users from being able to access the internet or any other network services. Such attacks might be come in

What are the benefits of intranet applications, What are the benefits of In...

What are the benefits of Intranet applications The benefits of successful Intranet applications can be enumerated as follows: Cheaper: Use of client browsers with one

Recognize the purpose of icmp, ICMP is used to send error and control messa...

ICMP is used to send error and control messages. Ping uses ICMP to carry the echo-request and echo-reply.

Combine subtitution and transposition, how to own cipher to encrypt and dec...

how to own cipher to encrypt and decrypt message by combine both substitution ans transposition algorithm using c program

Des key, Assume the following 64-bit DES key (expressed in hexadecimal): FE...

Assume the following 64-bit DES key (expressed in hexadecimal): FEFE FEFE FEFE FEFE (a) What is the term for such a key? (b) State the value of each of the 48-bit round keys

#title.assignment., hii i want to make a assignment from you. please help m...

hii i want to make a assignment from you. please help me.

Error detection-general, Q. Error Detection-General? Sender transmi...

Q. Error Detection-General? Sender transmits every data unit twice Receiver performs bit-by-bit comparison between those two versions of data. Any mismatch would

Electronic mail - application layer, Electronic Mail One  of the  most...

Electronic Mail One  of the  most popular internet  services is electronic mail ( e mail). At  the beginning  of the internet era teh message sent by  electronic  mail were sh

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd