Define half-duplex, Computer Network Security


A half-duplex (HDX) system gives communication in both directions, but only one direction at a time. Hardly, once a party stats receiving a signal, it must need for the transmitter to stop broadcasting, before replying. A half-duplex machine is a two-party system such as a walkie-talkie, wherein one have to need "Over" or another previously designated command to show the end of transmission, and make sure that only one party transmits at a time, because both parties receive and transmit on the same frequency.

A good analogy for a half-duplex system could be a one-lane road with traffic controllers at every end. Traffic can flow in both ways, but only one direction at a time, controlled by the traffic controllers.


202_half duplex.png

Posted Date: 8/20/2012 2:33:06 AM | Location : United States

Related Discussions:- Define half-duplex, Assignment Help, Ask Question on Define half-duplex, Get Answer, Expert's Help, Define half-duplex Discussions

Write discussion on Define half-duplex
Your posts are moderated
Related Questions
i have an idea of clustering in wsns . where each and every sensor node use the reputation scheme and while clustering provide help against the selfishness atatck of the sensor nod

PARITY BIT: A parity bit is an extra bit transmitted with data item select to give the resulting bit odd or even parity. For example an even parity data packet 10100001 has p

In this section, you should create a program that emulates a GBN node. Two GBN nodes will be running to send packets to each other through the UDP protocol. For emulation purpose,

Problem: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

Question 1 Explain any two types of security policies Question 2 What is security attack? Explain with examples Question 3 Explain different characteristics that i

a) Calculate the CRC for the frame below: Frame: 1101011011 Generator: 10011 Message after appending 4 zero bits: 11010110110000 b) OSI refers to a system in which any

Question: (a) Distinguish between a mobile agent "state" and "code". (b) Differentiate between "weak" and "strong" mobility. (c) Mobile agent systems are known to have

INTRODUCTION TO PHYSICAL SECURITY The Physical security addresses design, execution, and maintenance of countermeasures which protect physical resources of an organization. The

QUESTION The major decision hierarchy for disclosing security problems is if the problem is with the product owned by the business or if it is used by the business. Although th

Question: (a) What is the major problem with public key encryption when compared to symmetric key encryption? (b) Consider the following protocol for communication between t