Explain full duplex data transmission, Computer Networking

Assignment Help:

Q. Explain Full Duplex data transmission?

- Have two separate Communication channels as well as use each one for simplex Data traffic (in different directions).

- If this is through we have two separate physical circuits each with a "forward" channel (for data) and a "reverse" channel (for acknowledgements).

- In both cases the bandwidth of the reverse channel is approximately entirely wasted and in effect the user is paying for two circuits but using only the capacity of one.

- A better idea is to utilize the same circuit for data in both directions and in this model the data frames from A to B are intermixed with the Acknowledgement frames from A to B.

- By gazing at the kind field in the header of an incoming frame the receiver can tell whether the frame is data or acknowledgement.


Related Discussions:- Explain full duplex data transmission

Explain fdm and tdm with example, Question 1 Explain FDM and TDM with exam...

Question 1 Explain FDM and TDM with example Question 2 Define B-ISDN and explain its services Question 3 What is symmetric key cryptography? Describe one symmetric

Subletting, Ask Design private subnetworks (using Class A range for CIDR) f...

Ask Design private subnetworks (using Class A range for CIDR) for each domain as in the table below, and complete the table. Hints: Consider how many network bits are required to a

Aaa, explain layered protocol architecture

explain layered protocol architecture

Program annotation packages, A fairly renowned approach in this area is Ope...

A fairly renowned approach in this area is OpenMP, a recently developed industry standard for shared memory programming on architectures with uniform memory access characteristics.

Network service model - network layer and routing, Network Service Model ...

Network Service Model The network  service  model  defines  the characteristics of end to end  transport of data between  one edge of the  network  to the  other  that is betwe

What are the security models by giving striking analogies, Security models ...

Security models by giving striking analogies to the real world A classical case study: (With due acknowledgements to the security exponent who proposed this theory.) He has c

State the methods to keep the attackers at bay, State the methods to keep t...

State the methods to keep the attackers at bay Another best methods to keep the attackers at bay is known as network address translator or NAT. The philosophy behind the design

Determine about unique least-cost path, Determine about unique least-cost p...

Determine about unique least-cost path If there is a unique least-cost path, the two algorithms will yield the similar result because they are both guaranteed to search the lea

Logged into a router, You are logged into a router, what command would repr...

You are logged into a router, what command would represent you the IP addresses of routers linked to you? Ans)show cdp neighbors detail

Write down the purpose of arp?, Address Resolution Protocol resolves the MA...

Address Resolution Protocol resolves the MAC address if the IP address is known. It is a layer 3 protocol.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd