Define half-duplex, Computer Network Security

 

A half-duplex (HDX) system gives communication in both directions, but only one direction at a time. Hardly, once a party stats receiving a signal, it must need for the transmitter to stop broadcasting, before replying. A half-duplex machine is a two-party system such as a walkie-talkie, wherein one have to need "Over" or another previously designated command to show the end of transmission, and make sure that only one party transmits at a time, because both parties receive and transmit on the same frequency.

A good analogy for a half-duplex system could be a one-lane road with traffic controllers at every end. Traffic can flow in both ways, but only one direction at a time, controlled by the traffic controllers.

 

202_half duplex.png

Posted Date: 8/20/2012 2:33:06 AM | Location : United States







Related Discussions:- Define half-duplex, Assignment Help, Ask Question on Define half-duplex, Get Answer, Expert's Help, Define half-duplex Discussions

Write discussion on Define half-duplex
Your posts are moderated
Related Questions
QUESTION (a) Illustrate the term file carving. (b) What are the basic three main techniques for image steganography? (c) Distinguish between vector graphics and raster

How can I get help for Linux automotion configuration (Network, virtualization, security and Firewal etc) with bash scrip. What is the charge for.

Hardware, Software, and Network Asset Identification What information attributes to track is dependent on: •    Requires of organization/risk management efforts •    Management


Question (a) Name 3 popular electronic mail access protocols? (b) i. What is DNS? ii. Briefly, describe what it does and how it works? iii. Why does DNS use a dist

Problem 1: a) One of the limitations of file processing systems is data inconsistency. Briefly explain with the help of an example what do you understand by this phrase. b)

RING TOPOLOGY In this topology of network the devices are connected to each other in packed loop. In this network first computer passes data packet to the second and then seco

You are designing a Demilitarized zone for a large corporation. Using design best practice, and the information that you have learned so far, propose a design that will provide the

Question: (i) ‘Implementation' is a critical stage of the Systems Development Life Cycle. Show the four approaches which are commonly used to implement information systems in

SECURING THE COMPONENTS Computer can be subject of an attack or the object of an attack. When subject of an attack, computer is used as lively tool to conduct attack. The figure