pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Hubs and Repeaters

Hubs/repeaters are used to connect together two or more network segments of any media type. In larger designs, signal quality begins to deteriorate as segments exceed their maximum length. Hubs provide the signal amplification required to allow a segment to be extended a greater distance. Passive hubs simply forward any data packets they receive over one port from one workstation to all their remaining ports. Active hubs, also sometimes referred to as multiport repeaters, regenerate the data bits in order to maintain a strong signal.

Hubs are also used in star topologies such as 10BaseT. A multi-port twisted pair hub allows several point-to-point segments to be joined into one network. One end of the point-to-point link is attached to the hub and the other is attached to the computer. If the hub is attached to a backbone, then all computers at the end of the twisted pair segments can communicate with all the hosts on the backbone.

Network

An important fact to note about hubs is that they only allow users to share Ethernet. A network of hubs/repeaters is termed a shared Ethernet, meaning that all members of the network are contending for transmission of data onto a single network (collision domain). This means that individual members of a shared network will only get a percentage of the available network bandwidth. The number and type of hubs in any one collision domain for 10BaseT Ethernet is limited by the following rules:

Network Type Max Nodes Per Segment Max Distance Per Segment
10BaseT 2 100m
10Base2 30 185m
10Base5 100 500m
10BaseFL 2 2000m

While repeaters allow LANs to extend beyond normal distance limitations, they still limit the number of nodes that can be supported. Bridges, routers and switches, however, allow LANs to grow significantly larger by virtue of their ability to support full Ethernet segments on each port.

Filed Under: Networking

Latest Articles

Planning for Proper VoIP Deployment

Voice over IP, or VoIP, is becoming more popular as companies are leveraging its ability to reduce costs and ease of deployment. The technology allows you to communicated over existing broadband connections. However, you need proper planning and network preparation before deploying VoIP – here are … [Read More...]

How To Kill A Running Process

How To Kill A Running Process Method #1: There are many ways to kill an active process, and in this article we will examine some of the most common and effective approaches to achieve this task. When deciding to end a process, especially during a time when your system is compromised with a … [Read More...]

av security 2012

How to Remove AV Security 2012

How to Remove AV Security 2012 AV Security 2012 shows off security warnings and says that your computer is infected with a virus. The warnings shown and virus threats detected are not real. This product is a scam. The real virus is AV Security 2012. This kind of virus is known as malware. It's … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Redditors Talk About the Impact of AI on Freelance Writers

AI technology has had a huge impact on our lives. A 2023 survey by Pew Research found that 56% of people use AI at least once a day or once a week. … [Read More...]

11 Most Popular Books on Perl Programming

Perl is not the most popular programming language. It has only one million users, compared to 12 million that use Python. However, it has a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Stellar Phoenix Photo Recovery Review

Stellar Photo Recovery Stellar Photo Recovery basically covers it all, for photos and media options, that is. This product, like the title says, is … [Read More...]

PostScript Laser Printers

The situation changed dramatically in 1985 with Adobe's announcement of PostScript Level 1, based on Forth and arguably the … [Read More...]

RAID tutorial – maintaining the RAID array

Since the context of this tutorial is a new system build, the configuration of of the RAID array was performed via the RAID Controller's BIOS Setup … [Read More...]

[footer_backtotop]

Copyright © 2025 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors