Explain full duplex data transmission, Computer Networking

Assignment Help:

Q. Explain Full Duplex data transmission?

- Have two separate Communication channels as well as use each one for simplex Data traffic (in different directions).

- If this is through we have two separate physical circuits each with a "forward" channel (for data) and a "reverse" channel (for acknowledgements).

- In both cases the bandwidth of the reverse channel is approximately entirely wasted and in effect the user is paying for two circuits but using only the capacity of one.

- A better idea is to utilize the same circuit for data in both directions and in this model the data frames from A to B are intermixed with the Acknowledgement frames from A to B.

- By gazing at the kind field in the header of an incoming frame the receiver can tell whether the frame is data or acknowledgement.


Related Discussions:- Explain full duplex data transmission

Advantages and disadvantages of public and private network, The disadvantag...

The disadvantages and advantages of Private and Public networks are shown in the table below:

Write down code snippets for the following in jade, Question 1 Using a ...

Question 1 Using a flowchart and appropriate annotations, describe the execution path of an Agent in JADE 2 Write down code snippets for the following in JADE a Agent A n

What is the use of a default gateway, What is the use of a default gateway?...

What is the use of a default gateway? Default gateways give means for the local networks to connect to the external network. The default gateway for connecting to the external

Functions and significance of tcp header’s fields, Describe the functions a...

Describe the functions and significances of all fields (such as Source Port and Destination Port) of a TCP header. Functions and significance of tcp header's fields FIELDS

Dynamic configuration and signaling, Dynamic Configuration int pvm...

Dynamic Configuration int pvm_addhosts( char **hosts, int nhost, int *infos ) Add hosts to the virtual machine. hosts is an array of strings naming the hosts to be

Give the structure of an atm uni cell header, a) Consider a hypothetical a...

a) Consider a hypothetical arrangement of ‘self-learning' bridges shown in the figure below. Assuming all are initially empty, give the forwarding tables for each of the bridges B

What are the threats include in computer software, What are the threats inc...

What are the threats include in computer software The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to

Types of vts sonet sdh, Types of VTs There are  several  option for  pa...

Types of VTs There are  several  option for  payload are actually mapped into the VT.  Locked mode VTs  bypass the pointers with a fixed  byte oriented mapping of limited flexi

Topology-tcp and udp sources, To relieve some programming burden, project 5...

To relieve some programming burden, project 5 is a group project that two students can form a group to do and submit one report. In your submitted report, please specify who is you

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd