Mesh, Computer Networking

Mesh

It is of two dimensional network.  In this every processing elements are arranged in a two dimensional grid. The processor are in rows i and column j are denoted by PEi.

The processors on the corner can communicate to two nearby neighbors i.e. PE00 can communicate with PE10and PE01. The processor on the edge can communicate to three adjacent processing elements i.e. PE01 can communicate with PE00,  PE02 and   PE11 and internally placed processors can communicate with four adjacent processors i.e. PE11  can communicate with PE01,   PE10, PE12,  and  PE21

                                          923_Mesh.png

Posted Date: 3/2/2013 5:20:41 AM | Location : United States







Related Discussions:- Mesh, Assignment Help, Ask Question on Mesh, Get Answer, Expert's Help, Mesh Discussions

Write discussion on Mesh
Your posts are moderated
Related Questions
modern technology in world of 21 century

What is Network Architecture? When two or more computer are linked with one another for the purpose of communicating data electronically, besides physical connection of comput

Q. Subnet layer of the TCP-IP model? These two layers of the OSI correspond straight to the subnet layer of the TCP/IP model. Majority of the time the lower layers under the

Q. Why we use numbering frames? Why numbering frames? Stop--and-wait ARQ, 1. Numbering Frames prevents the retaining of duplicate frames.. 2. Numbered acknowled

Describe at one disadvantage of a peer to peer network. When you are accessing the resources that are shared by one of the workstations on the network, that workstation takes

What advantages does fiber optics have over other media? One main advantage of fiber optics is that is it less susceptible to electrical interference. It also supports higher ba


What is client/server? Client/server is a type of network wherein one or more computers act as servers. Servers give a centralized repository of resources like printers and fil

QUESTION Write a report to explain the concept of LAN and WAN including the various components of the telecommunication infrastructure required by UTM Ltd. You are required to

Discuss an example of threats in computer software Assume only one attack out of the above list i.e., the virus attack. Though the present anti-virus software solutions can det