Explain the hubs and repeaters, Computer Networking

Assignment Help:

Hubs/Repeaters

Hubs/Repeaters are used to connect together two or more network segments of any media type. In larger design, signal quality starts to deteriorate as segment exceeds their maximum length. A hub gives the signal amplification required to permit a segment to be extended a greater distance.  Passive hub simply forwards any data packets they receive over one port from one workstation to all their remaining ports.  Active hubs, also sometimes referred to as "multiport repeaters", regenerate the data bits in order to handle a strong signal.   

 


Related Discussions:- Explain the hubs and repeaters

Metropolitan area network ( man)- fundamentals of networks , Normal 0 ...

Normal 0 false false false EN-IN X-NONE X-NONE Metropolitan area Network ( MAN) Metropoli

Was the entire transaction completed, The following information was obtaine...

The following information was obtained from a host computer: 00:05:17.176507 74.125.228.54.1270 > 64.254.128.66.25: S 2688560409:2688560409(0) win 16384 (DF) (ttl 46, id 2096

Explain point-to-point protocol in ccna, An industry standard suite of prot...

An industry standard suite of protocols for the use of point-to-point links to transport multiprotocol datagrams.

State the types of performance of computer hardware, State the types of per...

State the types of performance of computer hardware The hardware, i.e., the server or computer has a direct relationship on performance in the following areas: Reliabili

What is internet, What is Internet? Internet is a collection of network...

What is Internet? Internet is a collection of networks or network of networks. Various networks like LAN and WAN connected by suitable hardware and software to work in a seamle

Describe encapsulating, Can you describe encapsulating, carrier and passeng...

Can you describe encapsulating, carrier and passenger protocol?

Briefly describe three security requirements of an agent, QUESTION (a) ...

QUESTION (a) Briefly describe three security requirements of an agent (b) List four threats that may be caused by malicious hosts to mobile agents (c) Describe the forwar

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd