Repeaters, Computer Networking

REPEATERS:

 Repeaters are needed when copper wire communication is takes place. According to the fact that electrical signal goes weaker while travelling over copper lines. A repeater is used to gain the signal strength. It amplifies the weakening signal received from one packet and then retransmits onto another packet. It is given in the figure below:

286_REPEATERS.png

 

Figure

 One repeater doubles, two repeaters triple the highest cable length limitation.

 Devices attached to different code segments communicate as if they are connected to the similar cable.

 It is to be noticed that we cannot increase the maximum cable length as several times as we wish by just including repeaters. The reason for this is that each repeater produce a delay and the access function such as CSMA/CD does not work with long time delays.

 Ethernet standard specifies that any two stations may not be distinguish by more than four repeaters.

2288_REPEATERS1.png

Figure

The diagram displays repeaters using the vertical code segment. We see that only two repeaters differ any two stations in this function.

DISADVANTAGES OF REPEATERS:

 Repeaters do not known frame formats, they just retransmit and amplify the electrical signal. If a error or collision happens in one segment, repeaters retransmit and amplify also the error onto the other code segments.

Posted Date: 10/27/2012 9:09:27 AM | Location : United States







Related Discussions:- Repeaters, Assignment Help, Ask Question on Repeaters, Get Answer, Expert's Help, Repeaters Discussions

Write discussion on Repeaters
Your posts are moderated
Related Questions
How can the use of NAT and PAT, be considered a security mechanism? Research the acronym(s) if it is not a part of your collection.

Determine the disadvantages of SOCKS protocol The main problem with SOCKS is that it lacks transparency to software developers and users. Implementation requires a change to

This code properly implements the IP checksum function on a 32-bit machine: unsigned short cksum(unsigned short *buf, int count) { unsigned long sum = 0; while (count--) { sum += *

10Base2 an Ethernet term meaning a maximum transmitting rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 200 meters (185mts).

DNS Tunneling – Domain Name Server "If, on one system, it is possible to transmit bits to another in any form, and in turn receive a reply as a result of that transmission, th

Shortest path  The  dijkstra algorithms  four steps to discover what it called  the shortest path  tree . a.The algorithm  beings  to build  the tree identifying  its root.

Question 1 Explain the process of Components Identification and call establishment Question 2 Discuss on Basic services in GSM Question 3 Explain the Protocols Use

identify different network topologies.

Advantages of LS over DV algorithm There  are a number of advantages to link  state  protocols  especially when  compared to  the distance vector based  routing  protocols. The

Wide Area Network WAN Wide  Area Network  ( WANs) connect larger geographic  areas such as  London the UK or the  world. In this types  of networks  dedicated transoceanic cab