Hyper cube, Computer Networking

Assignment Help:

Hyper Cube

A Hypercube interconnection network is increament  of cube network. Hypercube interconnection network for n ≥ 3, can be distinct recursively as follow:

For n = 3, it cube network in which nodes are allocted number 0, 1, ......,7 in binary. In other words, one of the nodes is allocated a label 000, another one as 001.... And the final node as 111.

Then one node can communicate with one other node if their labels vary in exactly one place, e.g., the node with label 101 might communicate directly with 001, 000 and 111.

For n > 3, a hypercube can be described recursively as follows:

Take two hypercubes of dimension (n - 1) each having (n -1) bits labels as 00....0,

......11.....1

Next join the two nodes having similar labels each (n - 1) -dimension hypercubes and connect these nodes. Next prefix „1? the labels of one of the (n - 1) dimensional hypercube and „0? to the labels of the other hypercube. This entire the structure of n-dimensional hypercube. Direct connection is only among that pair of nodes which has a (solid) line linking the two nodes in the pair.

For n = 4 we draw 4-dimensional hypercube as show in Figure 12:

                          1516_Hyper Cube.png


Related Discussions:- Hyper cube

Des key, Assume the following 64-bit DES key (expressed in hexadecimal): FE...

Assume the following 64-bit DES key (expressed in hexadecimal): FEFE FEFE FEFE FEFE (a) What is the term for such a key? (b) State the value of each of the 48-bit round keys

What is encapsulation and de-encapsulation, Process to send data is called ...

Process to send data is called as encapsulation and process to receive data is called De-encapsulation.

What is mesh network, What is mesh network? A network in which there ar...

What is mesh network? A network in which there are many network links among computers to provide multiple paths for data to travel.

Categories of encryption - decryption, Q. Categories of Encryption - Decryp...

Q. Categories of Encryption - Decryption ? Categories of Encryption/Decryption - Symmetric-key - encryption key (Ke) and the decryption key (Kd) are the same and secret

Link-state routing, In link-state routing network topology is filled from...

In link-state routing network topology is filled from route calculation. Switches send link-state information about local joins. Every switch creates own routing tables. It needs

What is net stat, What is net stat? Netstat is a command line utility p...

What is net stat? Netstat is a command line utility program. It gives useful information about the current TCP/IP settings of a connection.

Disadvantages - point to point , Disadvantages You typically  would  no...

Disadvantages You typically  would  not use a packet filter  as your  only security solution for your network  packets filters have two  major  disadvantages. a. Low securit

Compute the number of lost packets of the down-stream, A mobile host (MH) i...

A mobile host (MH) is connected to a WLAN access network that uses MIP for mobility support. Consider that the RTTs between MH and HA are 0.3s while RTTs within a L2 subnet are 80

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd