Drawback of repeaters, Computer Networking

Drawback of  Repeaters.

Repeater  has no filtering capability as it forwards  every frame.

Repeater shell  be placed  at accurate distance  before  actual  signal becomes  lost due to  noise  which  can change  the meaning of  message completely.

Posted Date: 3/13/2013 1:26:00 AM | Location : United States







Related Discussions:- Drawback of repeaters, Assignment Help, Ask Question on Drawback of repeaters, Get Answer, Expert's Help, Drawback of repeaters Discussions

Write discussion on Drawback of repeaters
Your posts are moderated
Related Questions
Calculate the Network Address, the broadcast address and the host range, for the following host address i. 192.168.180.94/27 ii. 172.23.8.19 /21 iii. 147.252.238.20 255.255.240.0 b

Question: a) Describe the following two approaches used towards wireless frequency regulation. i. Regulated Band ii. Unlicensed Band b) An antenna is an electrical c

Give the Description of security tools Software are coming up in which the user can select the kind of security measure required to be taken for encryption. One such example is

Design the user interface for mode switching and data entry any way that you like. For example, to switch an application from transmit mode to receive mode, you can give it special

What is the client side of applications To build the client side of applications, developers use various tools. Some of the popular software development environments include Vi


Question: a) Describe the triangular delivery and two crossing problem that appears in Mobile IP. b) Discovery, Registration and Tunneling are three basic capabilities of Mo

Question The operational amplifier in the peak detector circuit shown in the figure below is powered from plus and minus 15 V. If Vout is at 1V and Vin is at 0.5V, at approxima

Use Packet Tracer software to model the network that you have designed, and configure the network to make sure it is running properly. The following requirements should be met:

a) An Introduction/Overview of Network Security issues. b) A Risk Assessment  analysis- to include:             Assets                                                         T