Repeaters, Computer Networking

REPEATERS:

 Repeaters are needed when copper wire communication is takes place. According to the fact that electrical signal goes weaker while travelling over copper lines. A repeater is used to gain the signal strength. It amplifies the weakening signal received from one packet and then retransmits onto another packet. It is given in the figure below:

286_REPEATERS.png

 

Figure

 One repeater doubles, two repeaters triple the highest cable length limitation.

 Devices attached to different code segments communicate as if they are connected to the similar cable.

 It is to be noticed that we cannot increase the maximum cable length as several times as we wish by just including repeaters. The reason for this is that each repeater produce a delay and the access function such as CSMA/CD does not work with long time delays.

 Ethernet standard specifies that any two stations may not be distinguish by more than four repeaters.

2288_REPEATERS1.png

Figure

The diagram displays repeaters using the vertical code segment. We see that only two repeaters differ any two stations in this function.

DISADVANTAGES OF REPEATERS:

 Repeaters do not known frame formats, they just retransmit and amplify the electrical signal. If a error or collision happens in one segment, repeaters retransmit and amplify also the error onto the other code segments.

Posted Date: 10/27/2012 9:09:27 AM | Location : United States







Related Discussions:- Repeaters, Assignment Help, Ask Question on Repeaters, Get Answer, Expert's Help, Repeaters Discussions

Write discussion on Repeaters
Your posts are moderated
Related Questions
So how packets do determines their way across the Internet? Does each computer linked to the Internet know where the other computers are? Do packets just get 'broadcast' to every c

Define Routing? The process of determining systematically hoe to forward messages toward the destination nodes based on its address is known as routing.

Explain the term - primary memory and hard disk A peculiar situation arises when the existing server arrives at a stage when it cannot handle the requests quickly and most of i

What is Kerberos in Networking? It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to stop intruders from discover

What are firewalls? Firewalls serve to protect an internal network from external attacks. These external threats can be hackers who need to steal data or computer viruses that

What are different kinds of packets in EIGRP?

Sender requests connection from network. Other receiver agrees to connection. Computers interchange data through connection. One-endpoint requests network to split connection when

You have been asked to design a Banking Network with two primary types of locations.  Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 s

When programming a server or a client, we have to deal with port numbers and IP addresses, but we usually do this through an abstraction called a socket. Sockets are the standard A

1. Bob has been given the task of changing the IP address and enabling telnet access on a CISCO 2950 enterprise switch. The current IP address is 10.10.10.2/8 the new IP address