Define full-duplex., Computer Network Security

full-duplex (FDX), accepts communication in both ways, and, unlike half-duplex, accept this to occur simultaneously. Land-line telephone networks are full-duplex, since they accept both callers be heard and to speak at the same time. A good principal for a full-duplex system would be a two-lane road with one lane for each way. Two-way radios may be, for instance, described as full-duplex systems, which receive a one frequency and transmit on a different frequency. This is also known frequency-division duplex. Frequency-division duplex machines can be extended to farther distances needing pairs of simple repeater bases, because the communications transferred on any one frequency always travel in the similar direction.

 

 

2141_full duplex.png

Posted Date: 8/20/2012 2:36:12 AM | Location : United States







Related Discussions:- Define full-duplex., Assignment Help, Ask Question on Define full-duplex., Get Answer, Expert's Help, Define full-duplex. Discussions

Write discussion on Define full-duplex.
Your posts are moderated
Related Questions

Vulnerability Identification Specific avenues threat agents can exploit to attack an information asset are known as vulnerabilities. Examine how each threat can be generated and

Stateless Packet Filtering Stateless or static packet filtering is the most straightforward kind of packet filtering that allows or disallows data transfer based on the addres

RING TOPOLOGY In this topology of network the devices are connected to each other in packed loop. In this network first computer passes data packet to the second and then seco

(a) Describe the principal characteristics of associative memory networks? (b) Name the two basic types of associative memories and the differences between them. (c) Give an

algorithm on simple intrest

B-Router Hybrid devices that has the features of both routers and bridges . A bridge router or brouter is a network machine that acts as a router and as a bridge. The brout

Thinking ethically is difficult without a background in moral philosophy. Asking people to embrace ethics without offering practical explanation of the efficacy of so doing, is a t

QUESTION (a) Illustrate the term file carving. (b) What are the basic three main techniques for image steganography? (c) Distinguish between vector graphics and raster

Systems-Specific Policy (SysSP) SysSPs are codified as standards and procedures which are used when configuring or maintaining systems. Systems specific policies fall into 2 g