Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
REPEATERS:
Repeaters are needed when copper wire communication is takes place. According to the fact that electrical signal goes weaker while travelling over copper lines. A repeater is used to gain the signal strength. It amplifies the weakening signal received from one packet and then retransmits onto another packet. It is given in the figure below:
Figure
One repeater doubles, two repeaters triple the highest cable length limitation.
Devices attached to different code segments communicate as if they are connected to the similar cable.
It is to be noticed that we cannot increase the maximum cable length as several times as we wish by just including repeaters. The reason for this is that each repeater produce a delay and the access function such as CSMA/CD does not work with long time delays.
Ethernet standard specifies that any two stations may not be distinguish by more than four repeaters.
The diagram displays repeaters using the vertical code segment. We see that only two repeaters differ any two stations in this function.
DISADVANTAGES OF REPEATERS:
Repeaters do not known frame formats, they just retransmit and amplify the electrical signal. If a error or collision happens in one segment, repeaters retransmit and amplify also the error onto the other code segments.
Explain how the lan model be developed The LAN model can be developed incrementally. If LAN is just a long cable. it cannot be brought down by single failure (if servers are re
QUESTION (a) What are the problems with IPv4 on today's Internet and how does IPv6 solve these problems? (b) Describe at least three ways in which IPv6 is more efficient tha
Q. Focus of Reliability Control? - Implementation of the OSI model puts emphasis on providing a reliable data transfer service while the TCP/IP model treats reliability as an e
Write the Generic Name of the OSI Layer a) The figures below illustrate, side by side, the OSI 7-layer reference model and the Internet protocol stack. Inside each box represen
How could a VPN be used to facilitate secure remote administration of a server?
Is personal firewall actually firewalls?
How LANs connected to Internet. Doubling every 18 months means factor of four gains in 3 years. In 9 years, gain is then 43 or 64, which leads to 6.4 billion hosts. My intuitio
PROTOCOL SOFTWARE AND ETHERNET WIRING: All wiring methods use identical Ethernet specifications. e.g. they need same message format. They need same CSMA/CD algorithems. They m
What is Ping? Ping is a utility program that permits you to check connectivity among network devices on the network. You can ping a device by using its IP address or device nam
What is Bit Stuffing? Bit stuffing is the process of adding one extra 0 whenever five consecutive is follow a 0 in the data, so that the receiver does not mistake the pattern 0
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd