Hypercube network and properties, Computer Networking

Assignment Help:

Hypercube Network

The hypercube architecture has played a vital role in the development of parallel processing and is still not much popular and influential. The highly symmetric recursive structure of the hypercube supports several of elegant and efficient parallel algorithms. Hypercubes are also known as n-cubes, where n shows the number of dimensions. An- cube can be defined recursively as depicted below:

864_cube.png

                           3-cube built of 2 2-cubes

                                         193_4 cube.png

4-cube built of 2 3-cubes

 Properties of Hypercube:

  • A node p in a n-cube has a distinctive label, its binary ID, that is a n-bit binary number.
  • The labels of any two neighboring nodes vary in exactly 1 bit.
  • Two nodes whose labels vary in k bits are linked by a shortest path of length k.
  • Hypercube is both edge- symmetric and node.

Hypercube structure can be used to execute many parallel algorithms requiring all-to- all communication, that is, algorithms in which every task must communicate with every other task. This structure let a computation requiring all-to-all communication among P tasks to be performed in just log P steps compared t polynomial time using other data structures like linked lists and arrays.


Related Discussions:- Hypercube network and properties

Sorting using interconnection networks, The combinational circuits use the ...

The combinational circuits use the comparators for comparing the storing and number them on the basis of minimum and maximum functions. Likewise, in the interconnection networks th

Explain about switching networks, Question 1: a. Differentiate between ...

Question 1: a. Differentiate between the several types of switching networks together with illustration. b. With the help of a diagram explain the two modes of operation un

Characteristics of the user private group scheme, Question: a) The cpi...

Question: a) The cpio utility has three operating modes. What are they? b) The characters of the permission string are broken up into three groups of three characters. Ex

Show the use of flow control, Q. Show the Use of flow control? Flow co...

Q. Show the Use of flow control? Flow control denotes to a set of procedures used to restrict the amount of data that the sender can send before waiting for Error Control

Name the categories of multiplexing, Name the categories of Multiplexing? ...

Name the categories of Multiplexing? There are three categories of multiplexing a. Frequency Division Multiplexing (FDM) b. Time Division Multiplexing (TDM)    i. Sync

What is overlapping signals, Normal 0 false false false ...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4 What is overlapping

Virtual private network vpns, Virtual Private Network  ( VPNs) When we ...

Virtual Private Network  ( VPNs) When we use the  internet  or the  risks to the security of our data  arise. The solve the security problem a virtual private network  used for

Sate 802.11 architecture, 802.11 Architecture ESS (Extended service set...

802.11 Architecture ESS (Extended service set) two or more BSSs with APs connected through a distribution system (wired LAN) in an infrastructure network

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd