Define half-duplex, Computer Network Security

 

A half-duplex (HDX) system gives communication in both directions, but only one direction at a time. Hardly, once a party stats receiving a signal, it must need for the transmitter to stop broadcasting, before replying. A half-duplex machine is a two-party system such as a walkie-talkie, wherein one have to need "Over" or another previously designated command to show the end of transmission, and make sure that only one party transmits at a time, because both parties receive and transmit on the same frequency.

A good analogy for a half-duplex system could be a one-lane road with traffic controllers at every end. Traffic can flow in both ways, but only one direction at a time, controlled by the traffic controllers.

 

202_half duplex.png

Posted Date: 8/20/2012 2:33:06 AM | Location : United States







Related Discussions:- Define half-duplex, Assignment Help, Ask Question on Define half-duplex, Get Answer, Expert's Help, Define half-duplex Discussions

Write discussion on Define half-duplex
Your posts are moderated
Related Questions
types of firewall and backup

how to encryt the data in plaintext cipher

QUESTION: a) Explain four issues that are generally addressed in the Needs Analysis phase in the building-block approach to network design. b) Sketch a typical hybrid star-b

Problem (a) Name the various layers of the OSI model. (b) Show, by means of a diagram, how  the TCP/IP  reference model  is different from the OSI-7 reference model? Why is

Confidentiality Confidentiality of information ensures that only those with sufficient privileges may access specific information. When unauthorized individuals can access inform

Describe the process a proposed standard goes through to become an RFC

What is the function of key secrecy and algorithm secrecy in security?  Algorithm Secrecy is explained as follows: ‘Algorithm secrecy’ is a method of keeping an algorithm

QUESTION (a) What do you understand by a VLAN? Provide one advantage of using a VLAN. (b) What is a trunk port in a VLAN? (c) A VLAN will be created using one or more

CARRIER  SENSE MULTIPLE ACCESS (CSMA) There is no central access management when computers transfer on Ethernet. For this solution the Ethernet employs CSMA to coordinate tran

(a) Describe the concept of zero knowledge proofs. Give a practical example. (b) Explain how a one way hash function works. (c) What are message authentication codes? (d)