Repeaters work at which layer of the OSI model?
A.) Network
B.) Session
C.) Transport
D.) Physical
Answers were Sorted based on User's Feedback
Answer / guest
Answer: D
Repeaters work at the Physical layer of the OSI model by
regenerating
the signal to extend the distance it can travel.
| Is This Answer Correct ? | 91 Yes | 6 No |
Answer / kunal
Repeaters work at the Physical layer of the OSI model by
regenerating the signal to extend the distance it can travel.
But it depends on which type of repeater it is sometimes it
works on network layer also.
| Is This Answer Correct ? | 29 Yes | 5 No |
Answer / r. hatman
Physical (L1), because if it would work at Network layer,
then it would in effect be a Router.
From software/firmware perspective I would guess that
typically device which is configured (or is limited just) to
be a Repeater, will forward anything it receives from L1
receive (callback) function to the L1 send function. This
can also be a loop back built into the L1 module or
technically L1 module can be without it and data is looped
back at some higher layer but in effect this is still a L1
function. Often this has to be implemented as a
"store-and-forward" system, since you cannot often both send
and receive to same media at the same time.
| Is This Answer Correct ? | 6 Yes | 3 No |
Which command we give on privilege mode for coming back to user execution mode?
What is the maximum value of administrative you can use?
Which two statements about integrated services digital network (ISDN) are true? A. ISDN provides data only capability B. ISDN provides an integrated voice/data capability C. The ISDN standards define the hardware and call setup schemes for end the end digital connectivity D. Users receive more bandwidth on WANS with a leased lin of 56 Cops than with multiple B channels
What’s the default CDP holdtime in seconds for Cisco routers?
Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address
What is the Function of Router?
Which command, that is used to test address configuration, uses Time-To-Live (TTL) values to generate messages from each router. A) telnet B) ping C) trace D) bootp
Based upon the 1st octet rule identify the range for a Class A address? A.) 1 - 126 B.) 192 - 223 C.) 128 - 191 D.) 1 - 191
How do we do encryption and authentication in L2TP?
hi friends i donot know this is the networking question or not but if you help me then i will thankfull to you the problem is like that in my comnay there are 200 user which log one at a time now only one user is not able to get the dhcp address and othr are geting the dhcp my company sys admin is saying that this is the n/w fault while i am saying that this is not the n/w fault for the cleaerfication of my side i take a straight workng cable and connect that user directly to my cisco 24port switch now problem is stiil like that but one thing i wan to say he is geting manually ip and able to access internet he is able to ping the server but whrnever he tyeme \\<ip address of server> error comes like networl path provided not accepted by provider some thing like that. my systm admin is saying that i have o do somthing on my firewall but i am saying that no issue with firewall in that i connect my latop to the spefic port from where the user is conected then i am geting dhcp ip address and i am able to connect the server also i donot know why this is happen my syadmin is senior to me so i canot blame him plz help e what to do i am very weak in the filed of systym jitendera kumar sinha
Which protocol resolves an IP address to a MAC address? A.) DHCP B.) RARP C.) ARP D.) NBP E.) DNS
Identify 2 features of PPP PAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) More secure than CHAP D.) Remote node is control of authentication process