Define full-duplex., Computer Network Security

full-duplex (FDX), accepts communication in both ways, and, unlike half-duplex, accept this to occur simultaneously. Land-line telephone networks are full-duplex, since they accept both callers be heard and to speak at the same time. A good principal for a full-duplex system would be a two-lane road with one lane for each way. Two-way radios may be, for instance, described as full-duplex systems, which receive a one frequency and transmit on a different frequency. This is also known frequency-division duplex. Frequency-division duplex machines can be extended to farther distances needing pairs of simple repeater bases, because the communications transferred on any one frequency always travel in the similar direction.

 

 

2141_full duplex.png

Posted Date: 8/20/2012 2:36:12 AM | Location : United States







Related Discussions:- Define full-duplex., Assignment Help, Ask Question on Define full-duplex., Get Answer, Expert's Help, Define full-duplex. Discussions

Write discussion on Define full-duplex.
Your posts are moderated
Related Questions
You are provided with 3000 sample keystrokes for 5 users mentioned above. You can find this data using the ‘Lab 2 User Data' link in the ‘Lab 2' folder on Blackboard. Please note t

Question : (a) What do you meant by the term "Bastion Host"? What is its use? (b) "Hostile" Java applets will do undesirable actions. Mention two problems caused by Hosti

What is the concept of topology?

(a) Describe RSA encryption. (b) For an RSA encryption the values of the primes are: p=29, q=31. select e=11, evaluate the public and private keys. (c) How can RSA be used fo

VIRTUAL PACKETS These data packets serve same reason in Internet as frames on LAN. Every packet has a header. Routers, which are normally gateways, transfer packets between ph

Spambot Detection: The  previous studies in this field  have focused on content and meta-content based features.  The main assumption in this area of spam detection of late is

Describe the important features of application layer. The features of the application layer are as follows. 1. Efficient User Interface Design is explained below: Appli

CONCEPT OF PACKET : Network systems splits data in small junks or blocks known as packets, which they send individually. Why we required packets rather than bits? The answer to

(a) An opponent is using RSA with the public key {e=53, n=77}. You intercept the ciphertext C=10. (All values on this problem, including the ciphertext and the cleartext, are nume

TOKEN RING Many LAN methods that are ring topology need token passing for synchronized access to the ring. The ring itself is acts as a single shared communication phase. Both