Mesh, Computer Networking

Mesh

It is of two dimensional network.  In this every processing elements are arranged in a two dimensional grid. The processor are in rows i and column j are denoted by PEi.

The processors on the corner can communicate to two nearby neighbors i.e. PE00 can communicate with PE10and PE01. The processor on the edge can communicate to three adjacent processing elements i.e. PE01 can communicate with PE00,  PE02 and   PE11 and internally placed processors can communicate with four adjacent processors i.e. PE11  can communicate with PE01,   PE10, PE12,  and  PE21

                                          923_Mesh.png

Posted Date: 3/2/2013 5:20:41 AM | Location : United States







Related Discussions:- Mesh, Assignment Help, Ask Question on Mesh, Get Answer, Expert's Help, Mesh Discussions

Write discussion on Mesh
Your posts are moderated
Related Questions
objective practical questios answers

Q. How can data to be exchanged between Networks? Internetwork Links in an internetwork

Any protocol used by an internetwork to exchange routing data within an autonomous system. E.g. RIP, IGRP and OSPF.

Q. Advantages of Fiber Optics? - Higher bandwidth in comparison to twisted-pair and coaxial cable is not limited by medium but by equipment used to generate and receive signals

Hubs/Repeaters Hubs/Repeaters are used to connect together two or more network segments of any media type. In larger design, signal quality starts to deteriorate as segment exc

Has a central core conductor covered in an insulating sheath encased in an outer conductor of metal foil  RG numbers indicate physical specs such as thickness and type of insula

Computer Networking 1. Explain different network structures in use. 2. Elaborate the architecture and usage of ISDN. 3. Discuss the concept of framing in Data Link Layer

What is Internet? Internet is a collection of networks or network of networks. Various networks like LAN and WAN connected by suitable hardware and software to work in a seamle

To use a subnet or classless address, table under routers and hosts that have address must keep two pieces of information with every address: the 32-bit address itself and another

Question: (a) What is a script kiddie? Is it a significant security threat, and why? (b) Assume that UNIX uses the user login name in lieu of the traditional salt, what is