Hyper cube, Computer Networking

Assignment Help:

Hyper Cube

A Hypercube interconnection network is increament  of cube network. Hypercube interconnection network for n ≥ 3, can be distinct recursively as follow:

For n = 3, it cube network in which nodes are allocted number 0, 1, ......,7 in binary. In other words, one of the nodes is allocated a label 000, another one as 001.... And the final node as 111.

Then one node can communicate with one other node if their labels vary in exactly one place, e.g., the node with label 101 might communicate directly with 001, 000 and 111.

For n > 3, a hypercube can be described recursively as follows:

Take two hypercubes of dimension (n - 1) each having (n -1) bits labels as 00....0,

......11.....1

Next join the two nodes having similar labels each (n - 1) -dimension hypercubes and connect these nodes. Next prefix „1? the labels of one of the (n - 1) dimensional hypercube and „0? to the labels of the other hypercube. This entire the structure of n-dimensional hypercube. Direct connection is only among that pair of nodes which has a (solid) line linking the two nodes in the pair.

For n = 4 we draw 4-dimensional hypercube as show in Figure 12:

                          1516_Hyper Cube.png


Related Discussions:- Hyper cube

Calculate bandwidth needed for voice traffic, The second point to consider ...

The second point to consider is that from each location, some calls are internal to that site and some are going to outside locations. Again, as an approximation, MyCo telecom peop

Types of ospf configuration, Name the types of OSPF Configuration? Ans) ...

Name the types of OSPF Configuration? Ans) There are Two Types of OSPF configuration A ) SINGLE AREA b) MULTI AREA

Vpn technology - point to point , VPN Technology For an organization  ...

VPN Technology For an organization  VPN  technology  uses some main  techniques for privacy a.Encryption /Authentication b.Tunnelling c.Fire walls

Discuss user datagram protocol, Problem 1 Bring out the differences bet...

Problem 1 Bring out the differences between POP and IMAP4 Problem 2 Discuss User Datagram protocol Problem 3 Explain the various steps in TCP congestion control

Deadlock avoidance or prevention, Deadlock Avoidance To avoid deadlock...

Deadlock Avoidance To avoid deadlocks two types of strategies are used: 1) Static prevention: It uses V and P operators and Semaphores to allocate and deallocate shared res

Bridge - network layer and routing , Bridge A bridge  operation sin bo...

Bridge A bridge  operation sin both  physical  and data link  layer of OSI model. At physical  layer  it works  like  repeater as it regenerates the  signal  and performs  int

Virtual channel (or circuits), Connections in ATM are known virtual circuit...

Connections in ATM are known virtual circuits or virtual channels These are known virtual, since connections are created in ATM by starting values in memory locations (tables) in A

State synchronous FDDI, Synchronous Synchronous traffic is able to cons...

Synchronous Synchronous traffic is able to consume a portion of the 100 Mbps total bandwidth of an FDDI network while asynchronous traffic can consume the rest. Synchronous

Determine the window positions for succession of events, Two neighbouring n...

Two neighbouring nodes (A and B) use a Go-Back-N protocol with a 3-bit sequence number and a window size of 4. Acknowledgments are cumulative. Assuming A is transmitting and B is r

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd