Next Article in Journal
Generalized Integral Inequalities for Hermite–Hadamard-Type Inequalities via s-Convexity on Fractal Sets
Previous Article in Journal
A MAGDM Method Based on Possibility Distribution Hesitant Fuzzy Linguistic Term Set and Its Application
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Fault-Tolerant Path-Embedding of Twisted Hypercube-Like Networks (THLNs)

School of Computer Science and Technology, Dalian University of Technology, Dalian 116024, China
*
Author to whom correspondence should be addressed.
Mathematics 2019, 7(11), 1066; https://doi.org/10.3390/math7111066
Submission received: 18 August 2019 / Revised: 15 October 2019 / Accepted: 22 October 2019 / Published: 6 November 2019
(This article belongs to the Section Network Science)

Abstract

:
It is known widely that an interconnection network can be denoted by a graph G = ( V , E ) , where V denotes the vertex set and E denotes the edge set. Investigating structures of G is necessary to design a suitable topological structure of interconnection network. One of the critical issues in evaluating an interconnection network is graph embedding, which concerns whether a host graph contains a guest graph as its subgraph. Linear arrays (i.e., paths) and rings (i.e., cycles) are two ordinary guest graphs (or basic networks) for parallel and distributed computation. In the process of large-scale interconnection network operation, it is inevitable that various errors may occur at nodes and edges. It is significant to find an embedding of a guest graph into a host graph where all faulty nodes and edges have been removed. This is named as fault-tolerant embedding. The twisted hypercube-like networks ( T H L N s ) contain several important hypercube variants. This paper is concerned with the fault-tolerant path-embedding of n-dimensional (n-D) T H L N s . Let G n be an n-D T H L N and F be a subset of V ( G n ) E ( G n ) with | F | n 2 . We show that for two different arbitrary correct vertices u and v, there is a faultless path P u v of every length l with 2 n 1 1 l 2 n f v 1 α , where α = 0 if vertices u and v form a normal vertex-pair and α = 1 if vertices u and v form a weak vertex-pair in G n F ( n 5 ).

1. Introduction

As the infrastructure of cloud computing and the innovation platform of next generation network technology, the research of data center networks has become a hot topic in the academic and industrial circles in recent years. The performance of data center networks determine the performance of cloud computing to a large extent. Data center networks require a cluster of large number of switches, servers, and links. So what kind of topological network structure is used to connect these thousands of network components to make the system have the best performance and the lowest cost? What method is used to design such an interconnected network?
It is widely known that an interconnection network can be denoted by a graph G = ( V , E ) , where V denotes the vertex set and E denotes the edge set. Investigating structures of G is necessary to design a suitable topological structure of an interconnection network.
The n-dimensional hypercube [1], which possesses many outstanding properties such as recursive structure, relatively small degree, high symmetry, effective routing, and broadcasting algorithms [2], is one of the most efficient, versatile interconnection networks and, thus, becomes the preferred topological structure of parallel processing and parallel computing systems [3,4]. Thus, a hypercube is also one of the topological structures of data center networks [5]. Although hypercube networks have many excellent properties, it is well known that they also have inherent shortcomings, such as a large diameter. Therefore, many scholars have proposed some hypercube variants, aiming at improving the defects of hypercubes, such as Efe’s crossed cubes [6], Cull’s and Larson’s Möbius cubes [7], Hilbers’s twisted cubes [8], and Yang’s locally twisted cubes [9]. These hypercube variants retain the good properties of hypercubes, but also have many properties superior to hypercubes, such as the diameter of hypercube variants being almost half of the diameter of hypercubes.
One of the critical issues in evaluating an interconnection network is how well other existing networks can be embedded into this network. This problem can be modeled by the following graph embedding problem: Given a host graph G 2 = ( V 2 , E 2 ) , which denotes the network into which other networks are to be embedded, and a guest graph G 1 = ( V 1 , E 1 ) , which denotes the network to be embedded, the problem is to find a mapping from each node of G 1 to a node of G 2 , and a mapping from each edge of G 1 to a path in G 2 . Graph embedding has good applications in allocating concurrent processes to processors in the network, and transplanting parallel algorithms developed for one network to a different one [10,11]. Linear arrays (i.e., paths) and rings (i.e., cycles) are two ordinary guest graphs (or fundamental networks) for parallel and distributed computing.
The hypercubes and hypercube variants can embed paths [12,13,14], cycles [15,16], trees [17,18], and meshes [19,20,21]. A path (respectively, cycle) is a Hamiltonian path (respectively, Hamiltonian cycle) if it passes through every vertex of graph G once and only once. If a graph contains a Hamiltonian cycle, then it is Hamiltonian. A graph G is Hamiltonian connected if for any pair of distinct vertices u and v, there exists a Hamiltonian path P u v .
The data center network stores a large amount of important data information and requires high reliability. Because of the large number of switches, servers, and links in the data center network, it is difficult to avoid failures. Fault tolerance ensures that a variety of tasks that are being performed, such as information processing or algorithms, can run normally when some resources (servers, switches, or links) in a data center network fail. A good network can ensure that the remaining subnets will function properly even if some nodes or edges have errors. Therefore, it is of great practical significance to study the fault-tolerant performance of the network. Fault-tolerant embedding is to find an embedding of a guest graph into a host graph where all faulty nodes and edges have been removed.
Much work has been done on the fault-tolerant embedding [22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42]. In 2007, Fan et al. [13] proved that twisted cubes T Q n can embed a path of length l between any two different nodes for any faulty set F V ( T Q n ) E ( T Q n ) with | F | n 3 and any integer l with 2 n 1 1 l | V ( T Q n F ) | 1 ( n 3 ). In 2008, Ma et al. [33] proved the same result of path-embedding in crossed cubes C Q n . A survey paper of Xu and Ma [23] lists almost all results on this topics until 2009. In 2012, Ye et al. [35] proved that a path of length l can be embedded between any two different nodes in n-dimensional locally twisted cubes L T Q n for any faulty set F V ( L T Q n ) E ( L T Q n ) with | F | n 3 and any integer l with 2 n 1 1 l | V ( L T Q n F ) | 1 ( n 3 ). In 2018, we [37] proved the fault-tolerant path-embedding in augmented cubes A Q n with up to ( 2 n 4 ) -faults. However, if there are n 2 faulty elements in T Q n , C Q n , L T Q n respectively which are adjacent to one vertex, then the vertex must be a 2-degree vertex. It is extremely difficult to find the path with some length in this extreme case. Therefore, we [26] put forward the concept of weak 2-degree vertex and weak vertex-pair, where we simultaneously proved that the weak 2-degree vertex and weak vertex-pair are unique if they exist in a graph. Afterward we improved the fault-tolerant Hamiltonian path embedding with n 2 fault elements, excluding only the weak vertex-pair in twisted hypercube-like networks ( T H L N s ).
The hypercube-like networks ( H L N s ) are a large class of interconnection networks [24,25,43]. Twisted hypercube-like networks ( T H L N s ) proposed by Yang [40] in 2011, are a subclass in H L N s .
Definition 1
([40]). An n ( n 3 )-dimensional (n-D) twisted hypercube-like network ( T H L N ) is a graph defined recursively as follows.
(1) A 3-D T H L N is isomorphic to the graph depicted in Figure 1a.
(2) For n 4 , an n-D T H L N G n is obtained from two vertex-disjoint ( n 1 ) -D T H L N s , denoted by G n 1 0 and G n 1 1 , in this way:
V ( G n ) = V ( G n 1 0 ) V ( G n 1 1 ) , E ( G n ) = E ( G n 1 0 ) E ( G n 1 1 ) { ( u , ϕ ( u ) ) : u V ( G n 1 0 ) } ,
where ϕ : V ( G n 1 0 ) V ( G n 1 1 ) is a bijective mapping. In the following, we will denote this graph G n as G n = ϕ ( G n 1 0 , G n 1 1 ). Figure 1b plots a 4 D T H L N .
Specifically, the previously-mentioned hypercube variant networks (crossed cubes C Q n , Möbius cubes M Q n , twisted cubes T Q n , and locally twisted cubes L T Q n ) are all T H L N s . In 2005, Park et al. [24] demonstrated that all n-D T H L N s are Hamiltonian with at most n 2 faulty elements and Hamiltonian connected with at most n 3 faulty elements. Furthermore, using the Hamiltonian connectivity of T H L N s , some scholars [13,33,35] have improved the lower bound of the path length in each T H L N s with n 3 faults. In 2018, Zhang et al. [26] improved the upper bound of fault tolerant Hamiltonian connectivity to n 2 excepting only a pair of vertices and gave the definitions of weak vertex-pair and normal vertex-pair as follows.
Definition 2
([26]). Let F V ( G n ) E ( G n ) with | F | = n 2 . If G n F contains a vertex w such that N G n F ( w ) = { w 1 , w 2 } , then w is called as a weak 2-degree vertex and ( w 1 , w 2 ) is called as a w-weak vertex pair (short for weak vertex pair).
If F = { a , b } , for instance, then w is a weak 2-degree vertex and ( w 1 , w 2 ) is a weak vertex-pair in G 4 F (See Figure 2).
Unquestionably, for the weak vertex-pair ( w 1 , w 2 ) , any correct path P w 1 w 2 of length l 3 cannot include the weak 2-degree vertex w. It follows there is no correct Hamiltonian path joining vertices w 1 and w 2 in G n F [26]. However, we proved that G n F ( n 5 ) contains at most one weak 2-degree vertex w and one w-weak vertex-pair for any F V ( G n ) E ( G n ) with | F | n 2 in reference [26].
We first give the useful Definition and Theorem in reference [26] as follows.
Definition 3
([26]). If ( w 1 , w 2 ) is not a weak vertex-pair for any vertex w V ( G n F ) , then ( w 1 , w 2 ) is called as a normal vertex pair.
Theorem 1
([26]). Let G n be an n-dimensional T H L N and F V ( G n ) E ( G n ) with | F | n 2 . Then for any vertex-pair ( u , v ) in G n F , there is a ( n 2 ) -fault-tolerant Hamiltonian path P u v connecting vertices u and v except ( u , v ) being a weak vertex-pair.
In the paper, we studied the path-embedding in a T H L N with n 2 faulty elements and showed that if F V ( G n ) E ( G n ) and | F | n 2 , then for arbitrary two different correct vertices u and v, there is a fault-free path P u v of every length l with 2 n 1 1 l 2 n f v 1 α , where α = 0 if vertices u and v form a normal vertex-pair and α = 1 if vertices u and v form a weak vertex-pair in G n F ( n 5 ).
To do this simply, we can denote G n = L R , where L = G n 1 0 and R = G n 1 1 . For any vertex x L ( or R ), let x R ( or x L ) be the sole vertex adjacent to vertex x in R ( or L ), and N L ( x ) ( or N R ( x ) ) be the set of vertices that are adjacent to vertex x in L ( or R ). Let E C be the set of edges that join L to R and E L ( x ) ( or E R ( x ) ) be the set of edges incident to vertex x in L ( or R ).
We use P u v to represent the path from vertex u to vertex v. If P u w = ( u , u 1 , , u s , w ) , P w v = ( w , w 1 , , w t , v ) and V ( P u w ) V ( P w v ) = { w } , we use P u w + P w v to denote the path P u v = ( u , u 1 , , u s , w , w 1 , , w t , v ) , P u v ( u 1 , w 1 ) to represent the subpath of P u v which is from vertex u 1 to vertex w 1 , l u v to denote the length of P u v , d u v to denote the distance between vertex u to vertex v. We denote F L = F L , F R = F R , F C = F E C , F v = F V ( G n ) , F e = F E ( G n ) , f v = | F v | , f v L = | F v V ( L ) | , f v R = | F v V ( R ) | . We have f v = f v L + f v R .
This paper is organized as follows. Section 2 demonstrates the main result. Section 3 concludes the paper.

2. Main Result

In this section, we will establish the main result of the paper. We depict Theorem 2 as follows.
Theorem 2.
If F V ( G n ) E ( G n ) and | F | n 2 , then for any two distinct fault-free vertices u and v, there exists a fault-free path P u v of every length l with 2 n 1 1 l 2 n f v 1 α , where α = 0 if vertices u and v form a normal vertex-pair and α = 1 if vertices u and v form a weak vertex-pair in G n F ( n 5 ).
Proof. 
We prove the theorem by induction on n 5 . The result holds for n = 5 by developing computer program (https://github.com/ZhangHeidi/Hypercubes/blob/master/vcn02.c) using the depth-first searching technique combining with backtracking and a branch and bound algorithm. Assume that the theorem holds for n 1 with n 6 , then we must show the theorem holds for n. In general, we assume | F R | | F L | . Then | F R | n 2 2 n 4 . Since for any vertex x R , | N R ( x ) | = n 1 . Because of | F R | n 4 , we have | N R F R ( x ) | 3 . Then there is no weak vertex-pair in R F R .
Let u , v be any two distinct fault-free vertices in G n F . By Theorem 1, there is a faultless path P u v of length l = 2 n f v 1 if vertices u and v form a normal vertex-pair in G n F . Then we only need to find each length l with 2 n 1 1 l 2 n f v 2 between arbitrary different vertices u and v in G n F . We divide the proof to two cases: (1). | F L | n 3 ; (2). | F L | = n 2 .
Case 1. | F L | n 3 . We discuss this case by the following two cases: (1). u , v V ( L F L ) or u , v V ( R F R ) ; (2). u V ( L F L ) and v V ( R F R ) .
Case 1.1. u , v V ( L F L ) or u , v V ( R F R ) . Firstly, we prove the case of u , v V ( L F L ) .
Since | F L | n 3 , by induction hypothesis, there is a faultless path P u v of each length l with 2 n 2 1 l 2 n 1 f v L 2 in L F L . Notice that there exist l + 1 2 vertex-pairs in P u v . Since l + 1 2 ( n 2 ) 2 n 2 2 ( n 2 ) 4 ( n 6 ), there is a faultless edge a b E ( P u v ) with a R , b R , a a R , b b R F . Since | F R | n 4 , by induction hypothesis, there is a faultless path P a R b R of each length l a R b R with 2 n 2 1 l a R b R 2 n 1 f v R 1 in R F R . Let P u v 1 = P u v ( u , a ) + a a R + P a R b R + b R b + P u v ( b , v ) . Then P u v 1 is a faultless path of length l u v 1 with 2 n 1 1 l u v 1 2 n f v 2 in G n F (see Figure 3a).
For u , v V ( R F R ) , by a similar discussion, we can get a faultless path P u v 1 of each length l u v 1 with 2 n 1 1 l u v 1 2 n f v 2 in G n F .
Case 1.2. u V ( L F L ) and v V ( R F R ) .
By the definition of G n , | E C | = 2 n 1 . Since 2 n 1 ( n 2 ) 28 ( n 6 ), there is a faultless edge a b with a b E C , a , b { u , v } and a , b F . By induction hypothesis, there is a faultless path P u a of each length l u a with 2 n 2 1 l u a 2 n 1 f v L 2 in L F L and a faultless path P b v of each length l b v with 2 n 2 1 l b v 2 n 1 f v R 1 in R F R . Let P u v = P u a + a b + P b v . Then P u v is a faultless path of each length l u v with 2 n 1 1 l u v 2 n f v 2 in G n F (see Figure 3b).
Case 2. | F L | = n 2 . Then | F R | = | F C | = 0 . We divide the proof into two cases: (1). | F L V ( L ) | 1 ; (2). | F L V ( L ) | = 0 .
Case 2.1. | F L V ( L ) | 1 . Let x F L V ( L ) . In this situation, there exist three cases as follows: (1). u , v V ( L F L ) ; (2). u V ( L F L ) and v V ( R F R ) ; (3). u , v V ( R ) .
Case 2.1.1. u , v V ( L F L ) .
We mark the faulty vertex x as faultless temporarily. Let F 1 L = F L x , then | F 1 L | = | F L | 1 = n 3 . By induction hypothesis, there is a faultless path P u v of each length l u v with 2 n 2 1 l u v 2 n 1 ( f v L 1 ) 2 = 2 n 1 f v L 1 in L F 1 L . If the path P u v contains the faulty vertex x, let a , b N P u v ( x ) ; otherwise, we can arbitrarily select a vertex c from the path P u v . Let a , b N P u v ( c ) . Since | F R | = 0 , by induction hypothesis, there is a faultless path P a R b R of each length l a R b R with 2 n 2 1 l a R b R 2 n 1 1 in R. Let P u v 1 = P u v ( u , a ) + a a R + P a R b R + b R b + P u v ( b , v ) . Then P u v 1 is a faultless path of each length l u v 1 with 2 n 1 1 l u v 1 2 n f v 2 in G n F (see Figure 4).
Case 2.1.2. u V ( L F L ) and v V ( R ) .
We mark the faulty vertex x as faultless temporarily. Let F 1 L = F L x , then | F 1 L | = | F L | 1 = n 3 . By induction hypothesis, there is a faultless path P u x of each length l u x with 2 n 2 1 l u x 2 n 1 ( f v L 1 ) 2 = 2 n 1 f v L 1 in L F 1 L . Let x 1 N P u x ( x ) . There are the following two cases: (1). x 1 R = v ; (2). x 1 R v .
Case 2.1.2.1. x 1 R = v .
Let a b E ( P u x ) with a , b { u , x 1 , x } . We mark the correct vertex v as faulty temporarily. Let F 1 R = F R + v , then | F 1 R | = | F R | + 1 n 4 ( n 6 ). By induction hypothesis, there is a faultless path P a R b R of each length l a R b R with 2 n 2 1 l a R b R 2 n 1 2 in R F 1 R . Let P u v = P u x ( u , a ) + a a R + P a R b R + b R b + P u x ( b , x 1 ) + x 1 v . Then P u v is a faultless path of each length l u v with 2 n 1 1 l u v 2 n f v 2 in G n F (see Figure 5a).
Case 2.1.2.2. x 1 R v .
By induction hypothesis, there is a faultless path P x 1 R v of each length l x 1 R v with 2 n 2 1 l x 1 R v 2 n 1 1 in R. Let P u v = P u x ( u , x 1 ) + x 1 x 1 R + P x 1 R v . Then P u v is a faultless path of each length l u v with 2 n 1 1 l u v 2 n f v 2 in G n F (see Figure 5b).
Case 2.1.3. u , v V ( R ) .
Since | F R | = 0 , by induction hypothesis, there is a faultless path P u v of length l = 2 n 1 1 in R. Thus, we only need to consider each length l with 2 n 1 l u v 2 n f v 2 . We prove this case by the following two cases: (1). | { u L , v L } F v | 1 ; (2). | { u L , v L } F v | = 0 .
Case 2.1.3.1. | { u L , v L } F v | 1 . In general, assume u L F v . We mark the faulty vertex u L as faultless temporarily. Let F 1 L = F L u L , then | F 1 L | = | F L | 1 = n 3 .
Let S = N R ( v ) u . Then | S | n 2 . Since | F 1 L | = n 3 , there is a vertex v 1 S with v 1 L F . By induction hypothesis, there is a faultless path P u L v 1 L of each length l u L v 1 L with 2 n 2 1 l u L v 1 L 2 n 1 ( f v L 1 ) 2 = 2 n 1 f v L 1 in L F 1 L . Let u 1 N P u L v 1 L ( u L ) .
If u 1 R v , let F 1 R = F R + { v 1 , v } , then | F 1 R | = | F R | + 2 = 2 n 4 ( n 6 ) . By induction hypothesis, there is a faultless path P u u 1 R of each length l u u 1 R with 2 n 2 1 l u u 1 R 2 n 1 3 in R F 1 R . Let P u v = P u u 1 R + u 1 R u 1 + P u L v 1 L ( u 1 , v 1 L ) + v 1 L v 1 + v 1 v . Then P u v is a faultless path of each length l u v with 2 n 1 l u v 2 n f v 2 in G n F (See Figure 6a).
If u 1 R = v , let F 1 R = F R + v , then | F 1 R | = 1 n 4 ( n 6 ). By induction hypothesis, there is a faultless path P u v 1 of each length l u v 1 with 2 n 2 1 l u v 1 2 n 1 2 in R F 1 R . Let P u v = P u v 1 + v 1 v 1 L + P u L v 1 L ( v 1 L , u 1 ) + u 1 v . Then P u v is a fault-free path of each length l u v with 2 n 1 l u v 2 n f v 2 in G n F (See Figure 6b).
Case 2.1.3.2. | { u L , v L } F v | = 0 . We mark the faulty vertex x as faultless temporarily. Let F 1 L = F L x , then | F 1 L | = | F L | 1 = n 3 .
Since | F 1 L | = n 3 , by induction hypothesis, there is a faultless path P x v L of each length 2 n 2 1 l x v L 2 n 1 ( f v L 1 ) 2 = 2 n 1 f v L 1 in L F 1 L . Let x 1 N P x v L ( x ) .
If x 1 R = u , let F 1 R = F R + { u , v } , then | F 1 R | = | F R | + 2 = 2 n 4 ( n 6 ). Let a b E ( P x v L ) with a , b { x , x 1 , v L } . By induction hypothesis, there is a faultless path P a R b R of each length l a R b R with 2 n 2 1 l a R b R 2 n 1 3 in R F 1 R . Let P u v = u x 1 + P x v L ( x 1 , a ) + a a R + P a R b R + b R b + P x v L ( b , v L ) + v L v . Then P u v is a faultless path of each length l u v with 2 n 1 l u v 2 n f v 2 in G n F (See Figure 7a).
If x 1 R u , let F 1 R = F R + v , then | F 1 R | = | F R | + 1 = 1 n 4 ( n 6 ). By induction hypothesis, there is a faultless path P u x 1 R of each length l u x 1 R with 2 n 2 1 l u x 1 R 2 n 1 2 in R F 1 R . Let P u v = P u x 1 R + x 1 R x 1 + P x v L ( x 1 , v L ) + v L v . Then P u v is a faultless path of each length l u v with 2 n 1 l u v 2 n f v 2 in G n F (See Figure 7b).
Case 2.2. | F L V ( L ) | = 0 . Then F L = F e = F .
Let x V ( G n ) with d G n F ( x ) = δ ( G n F ) . There are the following two cases: (1). x { u , v } ; (2). x { u , v } .
Case 2.2.1. x { u , v } .
Let e be an edge with e F e , F 1 = F e + { x } , then | F 1 | = n 2 and | F v 1 | = 1 . We show that ( u , v ) is a normal vertex pair in G n F 1 as follows.
If δ ( G n F ) 4 , we discuss δ ( G n F 1 ) in the following four cases.
(1) For any correct vertex x 1 N G n F ( x ) with e E G n ( x 1 ) . Notice that δ ( G n F ) 4 , then d G n F 1 ( x 1 ) = d G n F ( x 1 ) 1 3 .
(2) For any correct vertex x 1 N G n F ( x ) with e E G n ( x 1 ) . Since F 1 = F e + { x } , we have d G n F 1 ( x 1 ) = d G n F ( x 1 ) 4 .
(3) For any correct vertex x 1 N G n F ( x ) with e E G n ( x 1 ) . Notice that δ ( G n F ) 4 , then d G n F 1 ( x 1 ) = d G n F ( x 1 ) + 1 5 .
(4) For any correct vertex x 1 N G n F ( x ) with e E G n ( x 1 ) , Since F 1 = F e + { x } , we have d G n F 1 ( x 1 ) = d G n F ( x 1 ) 4 .
Above all, we conclude that δ ( G n F 1 ) 3 .
If δ ( G n F ) 3 , then | E G n ( x ) F | n 3 . For any z V ( G n F 1 ) , since | F | = n 2 and | E G n ( x ) E G n ( z ) | 1 , we have | ( E G n ( z ) N G n ( z ) ) F 1 | 3 . It follows that δ ( G n F 1 ) n 3 3 ( n 6 ) .
Hence, there is no weak vertex-pair in G n F 1 , i.e., ( u , v ) is a normal vertex pair in G n F 1 . By the proof of Case 2.1 and Theorem 1, there is a faultless path P u v of every length l with 2 n 1 1 l 2 n | F v 1 | 1 = 2 n 2 in G n F ( n 5 ).
Case 2.2.2. x { u , v } . In general, assume that x = u .
Let e be an edge with e = u y F e with y v and F 1 = F e + { y } , then | F 1 | = n 2 and | F v 1 | = 1 . We show that ( u , v ) is a normal vertex pair in G n F 1 as follows.
Let z be an arbitrary vertex of V ( G n F 1 ) { u , v } .
If δ ( G n F ) 4 , similar to the above discussion in Case 2.2.1, we have δ ( G n F 1 ) 3 . It means that d G n F 1 ( z ) 3 .
If δ ( G n F ) 3 , then | E G n ( u ) F | n 3 . Since | F | = n 2 and | E G n ( u ) E G n ( z ) | 1 , we have | ( E G n ( z ) N G n ( z ) ) F 1 | 3 . It follows that d G n F 1 ( z ) n 3 3 ( n 6 ).
Hence, ( u , v ) can not be a z-weak vertex pair in G n F 1 , i.e., ( u , v ) is a normal vertex pair in G n F 1 . By the proof of Case 2.1 and Theorem 1, there is a faultless path P u v of every length l with 2 n 1 1 l 2 n | F v 1 | 1 = 2 n | F v 1 | 1 = 2 n 2 in G n F ( n 5 ). □

3. Concluding Remarks

This paper improved the previous result of Hamiltonian connectivity in twisted hypercube-like networks ( T H L N s ) with n 2 fault elements and extended the path-embedding in an n-D T H L N ( n 5 ) with a set F of up to n 2 faulty elements. We have proved that for arbitrary two different correct vertices u and v, there exists a fault-free path P u v of every length l with 2 n 1 1 l 2 n f v 1 α , where α = 0 if vertices u and v form a normal vertex-pair and α = 1 if vertices u and v form a weak vertex-pair in G n F ( n 5 ).
The lower bound of the path length cannot be uniformly improved in T H L N s . We designed an efficient algorithm (https://github.com/ZhangHeidi/Hypercubes/blob/master/vcn02.c) to find a lower bound d-rank path in each T H L N with up to n 2 fault elements (where d represents the shortest distance between any two vertices in the graph) and the lower bound of path is different in each graph of T H L N s . It is worthwhile to investigate the lower bound of path individually in every T H L N .
By the discussion in reference [26], M Q n , L T Q n , T Q n , C Q n T H L N s . The proposed theorem in the paper can be applied to several multiprocessor systems, including n-dimensional Möbius cubes M Q n [7], n-dimensional locally twisted cubes L T Q n [9], n-dimensional twisted cubes T Q n [8] for odd n, and n-dimensional crossed cubes C Q n [6]. In this paper, we apply our strategy to these four network topologies ( M Q n , L T Q n , T Q n , C Q n ). In future work, we will extend our strategy to other graphs of hypercube-like networks.

Author Contributions

Conceptualization, X.X., Q.Z. and Y.Y.; methodology, X.X., Q.Z. and Y.Y. and H.Z.; software, H.Z. and Y.Y.; validation, X.X., Q.Z., Y.Y. and H.Z.; formal analysis, X.X. and Y.Y.; investigation, H.Z.; resources, X.X. and Y.Y.; writing—original draft preparation, H.Z.; writing—review and editing, X.X., Q.Z. and Y.Y.; supervision, X.X., Q.Z. and Y.Y.; project administration, X.X.; funding acquisition, X.X., Q.Z. and Y.Y.

Funding

The work was supported by the NNSF of China (Nos. 61170303, 61472465, 61562066), the Natural Science Foundation of Liaoning Province (CN)(No. 20170540302), and the National Key R&D Program of China (No. 2018YFC0910500).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Parhami, B. An Introduction to Parallel Processing: Algorithms and Architectures; Plenum Press: New York, NY, USA, 1999. [Google Scholar]
  2. Hayes, P.; Mudge, T. Hypercube supercomputers. Proc. IEEE 1989, 77, 1829–1841. [Google Scholar] [CrossRef]
  3. Andre, F.; Verjus, J. Hypercubes and Distributed Computers; North-Halland: Amsterdam, The Netherlands; New York, NY, USA; Oxford, UK, 1989. [Google Scholar]
  4. Leighton, F. Introduction to Parallel Algorithms and Architectures: Arrays, Trees, Hypercubes; Morgan Kaufmann Publishers: San Mateo, CA, USA, 1991. [Google Scholar]
  5. Banks, E. Counting Ten Data Center Network Topologies. 2014. Available online: https://searchdatacenter.techtarget.com.cn/9-20784/ (accessed on 22 October 2014).
  6. Efe, K. The crossed cube architecture for parallel computation. IEEE Trans. Parallel Distrib. Syst. 1992, 3, 513–524. [Google Scholar] [CrossRef]
  7. Cull, P.; Larson, S.M. The Möbius cubes. IEEE Trans. Comput. 1995, 44, 647–659. [Google Scholar] [CrossRef]
  8. Hilbers, P.; Koopman, M.; van de Snepscheut, J. The twisted cube. Lect. Notes Comput. Sci. 1987, 258, 152–159. [Google Scholar]
  9. Yang, X.; Evans, D.; Megson, G. The locally twisted cubes. Int. J. Comput. Math. 2005, 82, 401–413. [Google Scholar] [CrossRef]
  10. Xu, J. Topological Structure and Analysis of Interconnection Networks; Kluwer Academic Publishers: Dordrecht, The Netherlands; Boston, MA, USA; London, UK, 2001. [Google Scholar]
  11. Xu, J. Combinatorial Theory in Networks; Academic Press: Beijing, UK, 2013. [Google Scholar]
  12. Fan, J.; Lin, X.; Jia, X. Optimal path embedding in crossed cubes. IEEE Trans. Parallel Distrib. Syst. 2005, 16, 1190–1200. [Google Scholar] [CrossRef]
  13. Fan, J.; Jia, X.; Lin, X. Optimal embeddings of paths with various lengths in twisted cubes. IEEE Trans. Parallel Distrib. Syst. 2007, 18, 511–521. [Google Scholar] [CrossRef]
  14. Fan, J.; Jia, X. Edge-pancyclicity and path-embeddability of bijective connection graphs. Inf. Sci. 2008, 178, 340–351. [Google Scholar] [CrossRef]
  15. Bae, M.; Bose, B. Edge disjoint hamiltonian cycles in k-ary n-cubes and hypercubes. IEEE Trans. Comput. 2003, 52, 1271–1284. [Google Scholar] [CrossRef]
  16. Zhou, D.; Fan, J.; Lin, C.; Zhou, J.; Wang, X. Cycles embedding in exchanged crossed cube. Int. J. Found. Comput. Sci. 2017, 28, 61–76. [Google Scholar] [CrossRef]
  17. Wagh, M.; Guzide, O. Mapping cycles and trees on wrap-around butterfly graphs. SIAM J. Comput. 2006, 35, 741–765. [Google Scholar] [CrossRef]
  18. Kulasinghe, P.; Bettayeb, S. Embedding binary trees into crossed cubes. IEEE Trans. Comput. 1995, 44, 923–929. [Google Scholar] [CrossRef]
  19. Fan, J.; Jia, X. Embedding meshes into crossed cubes. Inform. Sci. 2007, 177, 3151–3160. [Google Scholar] [CrossRef]
  20. Wang, X.; Fan, J.; Jia, X.; Zhang, S.; Yu, J. Embedding meshes into twisted-cubes. Inf. Sci. 2011, 181, 3085–3099. [Google Scholar] [CrossRef]
  21. Han, Y.; Fan, J.; Zhang, S.; Yang, J.; Qian, P. Embedding meshes into locally twisted cubes. Inf. Sci. 2010, 180, 3794–3805. [Google Scholar] [CrossRef]
  22. Wang, H.; Wang, J.; Xu, J. Edge-fault-tolerant bipanconnectivity of hypercubes. Inf. Sci. 2009, 179, 404–409. [Google Scholar] [CrossRef]
  23. Xu, J.; Ma, M. Survey on path and cycle embedding in some networks. Front. Math. China 2009, 4, 217–252. [Google Scholar] [CrossRef]
  24. Park, J.; Kim, H.; Lim, H. Fault-Hamiltonicity of hypercube-like interconnection networks. In Proceedings of the IEEE International Parallel and Distributed Processing Symposium, IPDPS, Denver, CO, USA, 4–8 April 2005. [Google Scholar]
  25. Park, J.; Lim, H.; Kim, H. Panconnectivity and pancyclicity of hypercube-like interconnection networks with faulty elements. Theor. Comput. Sci. 2007, 377, 170–180. [Google Scholar] [CrossRef] [Green Version]
  26. Zhang, H.; Xu, X.; Guo, J.; Yang, Y. Fault-Tolerant Hamiltonian Connectivity of Twisted Hypercube-Like Networks THLNs. IEEE Access 2018, 6, 74081–74090. [Google Scholar] [CrossRef]
  27. Zhang, H.; Xu, X.; Yang, Y. (n − 2)-Fault-Tolerant Edge-Pancyclicity of Möbius Cubes MQn. Ars Comb. in press.
  28. Wang, H.; Wang, J.; Xu, J. Fault-tolerant panconnectivity of augmented cubes. Front. Math. China 2009, 4, 697–719. [Google Scholar] [CrossRef]
  29. Chan, H.; Chang, J.; Wang, Y.; Horng, S. Geodesic-pancyclicity and fault-tolerant panconnectivity of augmented cubes. Appl. Math. Comput. 2009, 207, 333–339. [Google Scholar] [CrossRef]
  30. Fan, J.; Lin, X.; Pan, Y.; Jia, X. Optimal fault-tolerant embedding of paths in twisted cubes. J. Parallel Distrib. Comput. 2007, 67, 205–214. [Google Scholar] [CrossRef] [Green Version]
  31. Chang, J.; Yang, J. Fault-tolerant cycle-embedding in alternating group graphs. Appl. Math. Comput. 2008, 197, 760–767. [Google Scholar] [CrossRef]
  32. Fu, J. Edge-fault-tolerant vertex-pancyclicity of augmented cubes. Inf. Process Lett. 2010, 110, 439–443. [Google Scholar] [CrossRef]
  33. Ma, M.; Liu, G.; Xu, J. Fault-tolerant embedding of paths in crossed cubes. Theoret. Comput. Sci. 2008, 407, 110–116. [Google Scholar] [CrossRef] [Green Version]
  34. Ma, M.; Liu, G.; Pan, X. Path embedding in faulty hypercubes. Appl. Math. Comput. 2007, 192, 233–238. [Google Scholar] [CrossRef]
  35. Ye, C.; Ma, M.; Wang, W. Fault-tolerant path-embedding in locally twisted cubes. Ars Comb. 2012, 107, 51–63. [Google Scholar]
  36. Wang, W.; Ma, M.; Xu, J. Fault-tolerant pancyclicity of augmented cubes. Inf. Process Lett. 2007, 103, 52–56. [Google Scholar] [CrossRef] [Green Version]
  37. Xu, X.; Zhang, H.; Zhang, S.; Yang, Y. Fault-Tolerant Panconnectivity of Augmented Cubes AQn. Int. J. Found. Comput. Sci. 2018, in press. [Google Scholar]
  38. Xu, X.; Zhang, H.; Yang, Y. Fault-tolerant edge-pancyclicty of locally twisted cubes LTQn. Util. Math. 2019, in press. [Google Scholar]
  39. Xu, X.; Zhang, H.; Yang, Y. Fault-Tolerant Edge-Pancyclicity of Möbius cubes MQn. In Proceedings of the 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Melbourne, Australia, 11–13 December 2018; pp. 237–243. [Google Scholar]
  40. Yang, X.; Dong, Q.; Yang, E. Hamiltonian Properties of Twisted Hypercube-Like Networks with More Faulty Elements. Theor. Comput. Sci. 2011, 412, 2409–2417. [Google Scholar] [CrossRef]
  41. Xu, X.; Huang, Y.; Zhang, S. Fault-tolerant vertex-pancyclicity of locally twisted cubes LTQn. J. Parallel Distrib. Comput. 2016, 88, 57–62. [Google Scholar] [CrossRef]
  42. Xu, X.; Zhai, W.; Xu, J.; Deng, A.; Yang, Y. Fault-tolerant edge-pancyclicity of locally twisted cubes. Inf. Sci. 2011, 181, 2268–2277. [Google Scholar] [CrossRef]
  43. Chen, Y.; Tan, J.; Hsu, L.; Kao, S. Superconnectivity and super-edge-connectivity for some interconnection networks. Appl. Math. Comput. 2003, 140, 245–254. [Google Scholar]
Figure 1. Example of weak vertex-pair.
Figure 1. Example of weak vertex-pair.
Mathematics 07 01066 g001
Figure 2. Example of weak vertex-pair.
Figure 2. Example of weak vertex-pair.
Mathematics 07 01066 g002
Figure 3. (a) Illustration of proof of Case 1.1; (b) Illustration of proof of Case 1.2.
Figure 3. (a) Illustration of proof of Case 1.1; (b) Illustration of proof of Case 1.2.
Mathematics 07 01066 g003
Figure 4. Illustration of proof of Case 2.1.1.
Figure 4. Illustration of proof of Case 2.1.1.
Mathematics 07 01066 g004
Figure 5. (a) Illustration of proof of Case 2.1.2.1; (b) Illustration of proof of Case 2.1.2.2.
Figure 5. (a) Illustration of proof of Case 2.1.2.1; (b) Illustration of proof of Case 2.1.2.2.
Mathematics 07 01066 g005
Figure 6. (a) Illustration of proof of u 1 R v in Case 2.1.3.1; (b) Illustration of proof of u 1 R = v in Case 2.1.3.1.
Figure 6. (a) Illustration of proof of u 1 R v in Case 2.1.3.1; (b) Illustration of proof of u 1 R = v in Case 2.1.3.1.
Mathematics 07 01066 g006
Figure 7. (a) Illustration of proof of x 1 R = u in Case 2.1.3.2; (b) Illustration of proof of x 1 R u in Case 2.1.3.2.
Figure 7. (a) Illustration of proof of x 1 R = u in Case 2.1.3.2; (b) Illustration of proof of x 1 R u in Case 2.1.3.2.
Mathematics 07 01066 g007

Share and Cite

MDPI and ACS Style

Zhang, H.; Xu, X.; Zhang, Q.; Yang, Y. Fault-Tolerant Path-Embedding of Twisted Hypercube-Like Networks (THLNs). Mathematics 2019, 7, 1066. https://doi.org/10.3390/math7111066

AMA Style

Zhang H, Xu X, Zhang Q, Yang Y. Fault-Tolerant Path-Embedding of Twisted Hypercube-Like Networks (THLNs). Mathematics. 2019; 7(11):1066. https://doi.org/10.3390/math7111066

Chicago/Turabian Style

Zhang, Huifeng, Xirong Xu, Qiang Zhang, and Yuansheng Yang. 2019. "Fault-Tolerant Path-Embedding of Twisted Hypercube-Like Networks (THLNs)" Mathematics 7, no. 11: 1066. https://doi.org/10.3390/math7111066

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop