Define half-duplex, Computer Network Security

 

A half-duplex (HDX) system gives communication in both directions, but only one direction at a time. Hardly, once a party stats receiving a signal, it must need for the transmitter to stop broadcasting, before replying. A half-duplex machine is a two-party system such as a walkie-talkie, wherein one have to need "Over" or another previously designated command to show the end of transmission, and make sure that only one party transmits at a time, because both parties receive and transmit on the same frequency.

A good analogy for a half-duplex system could be a one-lane road with traffic controllers at every end. Traffic can flow in both ways, but only one direction at a time, controlled by the traffic controllers.

 

202_half duplex.png

Posted Date: 8/20/2012 2:33:06 AM | Location : United States







Related Discussions:- Define half-duplex, Assignment Help, Ask Question on Define half-duplex, Get Answer, Expert's Help, Define half-duplex Discussions

Write discussion on Define half-duplex
Your posts are moderated
Related Questions
Question: (a) A Wireless Mesh Network (WMN) is a communications network made up of radio nodes organized in a mesh topology. i. Describe the function of a TAP in WMNs. ii.

how would land elevation have canged if coronado had traveled 150 miles due west from what is today arizona instead of west toward new mexico

RING topology all computers are connected in loop. A ring topology is a network topology in which every node connects to exactly two other devices, forming a single continuous pa

Stateless Packet Filtering Stateless or static packet filtering is the most straightforward kind of packet filtering that allows or disallows data transfer based on the addres

INTRODUCTION TO PLANNING FOR SECURITY The creation of an information security program begins with creation and review of organization’s information security policies, standards,

MegaCorp INC. is a large manufacturing firm that operates 5 factories in Dallas, 4  factories in Los Angeles, and 5 factories in Albany, New York.  It operates a tightly  connected

Encryption Key Size When using ciphers, the size of crypto variable or key is quite important as the strength of many encryption applications and cryptosystems were measured by

FIREWALL ANALYSIS TOOLS There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of u

Management of Classified Data Management of classified data comprises of its storage, distribution, portability, and destruction of classified data. All information which is not

QUESTION Testing of a Business Continuity Plan (BCP) does not need to be costly or to interrupt the daily operations of the business. The result of the test should also be look