Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
REPEATERS:
Repeaters are needed when copper wire communication is takes place. According to the fact that electrical signal goes weaker while travelling over copper lines. A repeater is used to gain the signal strength. It amplifies the weakening signal received from one packet and then retransmits onto another packet. It is given in the figure below:
Figure
One repeater doubles, two repeaters triple the highest cable length limitation.
Devices attached to different code segments communicate as if they are connected to the similar cable.
It is to be noticed that we cannot increase the maximum cable length as several times as we wish by just including repeaters. The reason for this is that each repeater produce a delay and the access function such as CSMA/CD does not work with long time delays.
Ethernet standard specifies that any two stations may not be distinguish by more than four repeaters.
The diagram displays repeaters using the vertical code segment. We see that only two repeaters differ any two stations in this function.
DISADVANTAGES OF REPEATERS:
Repeaters do not known frame formats, they just retransmit and amplify the electrical signal. If a error or collision happens in one segment, repeaters retransmit and amplify also the error onto the other code segments.
Identify the purpose of the TCP three step handshakes Ans) The three step handshake establishes the parameters needed for a TCP connection. During the handshake process series n
The purpose of internetworking is universal service across heterogeneous networks. To give this service all computers, and routers have to agree to forward information from a sourc
Briefly write functionalities of different OSI layers? The OSI Reference Model includes seven layers. Basic functionality of each of them is as follows: 1. Physical Layer:
Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is known as path.
Relevance and Protection regarding DNS Attacks While discussing about the relevance and protection of the database, there are many things which need to consider. Almost, may o
.test a number to be prime number in network security
Lat take the CONNECT (client side), LISTEN, and ACCEPT (server side) socket primitives a) Why are these three needed for a TCP connection? b) Why are none of them needed for a U
Screening Router In this setup network router acts as a firewall. It checks all incoming and outgoing packets according to the predefined rules. This filter is placed at the c
Q. Unshielded Twisted Pair - transmission media? - A most common kind suitable for both voice and data transmission - Categories are determined by chain quality - Cat 3 c
How can the use of NAT and PAT, be considered a security mechanism? Research the acronym(s) if it is not a part of your collection.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd