Define full-duplex., Computer Network Security

full-duplex (FDX), accepts communication in both ways, and, unlike half-duplex, accept this to occur simultaneously. Land-line telephone networks are full-duplex, since they accept both callers be heard and to speak at the same time. A good principal for a full-duplex system would be a two-lane road with one lane for each way. Two-way radios may be, for instance, described as full-duplex systems, which receive a one frequency and transmit on a different frequency. This is also known frequency-division duplex. Frequency-division duplex machines can be extended to farther distances needing pairs of simple repeater bases, because the communications transferred on any one frequency always travel in the similar direction.

 

 

2141_full duplex.png

Posted Date: 8/20/2012 2:36:12 AM | Location : United States







Related Discussions:- Define full-duplex., Assignment Help, Ask Question on Define full-duplex., Get Answer, Expert's Help, Define full-duplex. Discussions

Write discussion on Define full-duplex.
Your posts are moderated
Related Questions
Benchmarking An alternative approach to risk management is Benchmarking. It is process of seeking out and studying practices in other organizations which one’s own organization de

Information System Security 1. Write about: a. Potential Risks to Information Systems b. Factors to be addressed for making information systems more secure 2. Write about t

Problem (a) Differentiate between private key and public key encryption. (b) What issue with private key encryption is resolved with public key encryption? (c) Describe

Identify Possible Controls For each threat and linked vulnerabilities which have residual risk, create primary list of control ideas. Residual risk is the risk which remains to

Question 1 a) Explain how CSMA/CD works. b) Describe the term "exponential back-off". c) Describe the differences between "circuit switching" and "packet switching". d) Th

IP DATAGRAM SIZE:  Datagrams may have different sizes i.e. Header area is generally fixed (20 octets) but can have various options. Data area may contain between 1 octet and 6

Question : (a) How does a 2-key rollover differ from the N-key rollover? (b) Why is isolation so important in interfacing? (c) Explain what is software debouncing.

Question: (a) Describe the term interference in the space, time, frequency, and code domain. (b) Consider a 1 G - AMPS: 824-849 MHz (forward) ; 869-894 MHz (reverse). B

on LAN,where are IP datagrams transported?

Around the globe the bank controlled Co-ops (Visa, MasterCard, Discover, and American Express) have rolled out millions of smart cards under the EMV (Europay, MasterCard, VISA) sta