Ring, Computer Engineering

Ring

This is a easy linear array where the end nodes are connected.  It is equivalent to a engage with wrap around connections. The data transmit in a ring is normally one direction. Thus, one disadvantage to this network is that some data transmit may require N/2 links to be traveled (like nodes 1 & 2) where N is the total number of nodes.

                                                  1963_Ring.png

Posted Date: 3/2/2013 5:22:05 AM | Location : United States







Related Discussions:- Ring, Assignment Help, Ask Question on Ring, Get Answer, Expert's Help, Ring Discussions

Write discussion on Ring
Your posts are moderated
Related Questions
What are RIMM? RDRAM chips can be assembled into larger modules known as RIMM. It can hold up to 16 RDRAM

Discuss grade of service. During busy hour, 1500 calls were offered to a group of trunks and 8 calls were lost. The average call duration was 120 seconds. Calculate the traffic off

what is batch system?how the disadvantage of batch system are overcome in multi-programming operating system?also describe how multi-programmed operating system is milestone in dev

Conjunctive Normal Form -artificial intelligence : For the resolution law to determine two sentences, they should both be in a normalized format known as conjunctive normal fo

Explain any three parsing techniques. Following are three parsing techniques: Top-down parsing: This parsing can be viewed as an attempt to get left-most derivations of an

Is the Process before and after the swap are the same? Give reason. Process before swapping is residing in the primary memory in its original form. The regions (text, data and

How aliases are used in DNS? Explain. CNAME entries are analogous to a symbolic link in a file system- the entry gives an alias for other DNS entry. Corporation of expertsmind

First Order Predicate Logic : This is a more expressive logic because it is mostly builds on propositional logic by allowing us to needs as constants, variables, predicates,

How and what data is gathered- Simulation To make this as realistic as possible, data is required to be gathered over a long period of time. This can be done by sensors near/i

Determine about the Security methods Security methods also protect information from accidental or intentional modification, manipulation or destruction. Most security experts o