Mesh, Computer Networking

Mesh

It is of two dimensional network.  In this every processing elements are arranged in a two dimensional grid. The processor are in rows i and column j are denoted by PEi.

The processors on the corner can communicate to two nearby neighbors i.e. PE00 can communicate with PE10and PE01. The processor on the edge can communicate to three adjacent processing elements i.e. PE01 can communicate with PE00,  PE02 and   PE11 and internally placed processors can communicate with four adjacent processors i.e. PE11  can communicate with PE01,   PE10, PE12,  and  PE21

                                          923_Mesh.png

Posted Date: 3/2/2013 5:20:41 AM | Location : United States







Related Discussions:- Mesh, Assignment Help, Ask Question on Mesh, Get Answer, Expert's Help, Mesh Discussions

Write discussion on Mesh
Your posts are moderated
Related Questions
State the uses of groupware With the use of groupware, users can easily do most of the office related management work, which otherwise would be extremely difficult. For instanc

QUESTION a) Give a detailed explanation of the following: Some dynamics systems can be built as variations on the client server model. b) Give one main drawback of the "Thin

Assume that a user wants to download from a server a web page that references 3 objects. The base page and each of the objects are of the same size that requires 20 ms transmission

Q. Illustrate about Sliding Window Protocols? - Sliding window - Keeps the unacknowledged outstanding frames in sender - Keeps the expected frames in receiver - Sequen

Retransmission of packets The disadvantage  of thronging away a correctly received packet is that  the subsequent retransmission  of the  packet might  be lost  or garbled and

Describe the term - License-free operation Users would prefer to buy and operate wireless LAN products without having to secure a license for the frequency band used by the LAN


QUESTION (a) Briefly describe three security requirements of an agent (b) List four threats that may be caused by malicious hosts to mobile agents (c) Describe the forwar

a)  What does the "CD" mean in the CSMA/CD? How is it implemented in the Ethernet?   b)  Consider an Ethernet hub with 8 ports and an Ethernet switch with 8 ports. In both cases

Configure VTP Pruning on the Switche s VTP pruning allows a VTP server to suppress IP broadcast traffic for particular VLANs to switches that do not have any ports in that VLAN.