Hyper cube, Computer Networking

Assignment Help:

Hyper Cube

A Hypercube interconnection network is increament  of cube network. Hypercube interconnection network for n ≥ 3, can be distinct recursively as follow:

For n = 3, it cube network in which nodes are allocted number 0, 1, ......,7 in binary. In other words, one of the nodes is allocated a label 000, another one as 001.... And the final node as 111.

Then one node can communicate with one other node if their labels vary in exactly one place, e.g., the node with label 101 might communicate directly with 001, 000 and 111.

For n > 3, a hypercube can be described recursively as follows:

Take two hypercubes of dimension (n - 1) each having (n -1) bits labels as 00....0,

......11.....1

Next join the two nodes having similar labels each (n - 1) -dimension hypercubes and connect these nodes. Next prefix „1? the labels of one of the (n - 1) dimensional hypercube and „0? to the labels of the other hypercube. This entire the structure of n-dimensional hypercube. Direct connection is only among that pair of nodes which has a (solid) line linking the two nodes in the pair.

For n = 4 we draw 4-dimensional hypercube as show in Figure 12:

                          1516_Hyper Cube.png


Related Discussions:- Hyper cube

Introduction of dns - domain name server, Introduction of DNS While di...

Introduction of DNS While discussing about the Internet, one things comes automatically in the n=mind and hence it is directly or indirectly depended on DNS. The DNS which sta

What is border gateway protocol, What is BGP (Border Gateway Protocol)? ...

What is BGP (Border Gateway Protocol)? It is a protocol used to promote the set of networks that can be reached within an autonomous system. BGP enable this information to be c

Describe briefly how the news filtering agent works, QUESTION (a) Conce...

QUESTION (a) Concerning agents that reduce workload, there are four agents developed using a learning approach among which is the News Filtering Agent. Name the other three age

What are the security models by giving striking analogies, Security models ...

Security models by giving striking analogies to the real world A classical case study: (With due acknowledgements to the security exponent who proposed this theory.) He has c

Explain how tcp handles connection-setup management, Problem: (a) Expla...

Problem: (a) Explain how TCP handles connection-setup management. (b) Each host on the Internet is currently assigned an IP address 32 bits long (IPv4). IPv4 addresses are u

Logged into a router, You are logged into a router, what command would repr...

You are logged into a router, what command would represent you the IP addresses of routers linked to you? Ans)show cdp neighbors detail

What is a transaction server, What is a Transaction server? With a tran...

What is a Transaction server? With a transaction server, the client includes remote procedures that reside on the server with an SQL database engine. These remote processes on

Parts count method, PARTS COUNT METHOD This prediction method is appli...

PARTS COUNT METHOD This prediction method is applicable at preliminary stages, during bid proposal and early design phases; when insufficient information is available regardin

Distinguish cisc and risc, Question 1 Distinguish CISC and RISC Question ...

Question 1 Distinguish CISC and RISC Question 2 Write a short note on Asynchronous Transfer Mode of transmission Question 3 Explain various client/server applications using Ja

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd