What is the 5-4-3-2-1 rule of network design?
Answers were Sorted based on User's Feedback
Answer / tushar
he 5-4-3-2-1 rule embodies a simple recipe for network design. It may not be easy to find examples in practice, but this rule neatly ties together several important elements of design theory.
To understand this rule, it's first necessary to understand the concepts of collision domains and propagation delay. Collision domains are portions of a network. When a network packet is transmitted over Ethernet, for example, it is possible for another packet from a different source to be transmitted close enough in time to the first packet to cause a collision on the wire. The total range over which a packet can travel and potentially collide with another is its collision domain.
Propagation delays are a property of the physical medium (e.g., Ethernet). Propagation delays help determine how much of a time difference between the sending of two packets on a collision domain is "close enough" to actually cause a collision. The greater the propagation delay, the increased likelihood of collisons.
The 5-4-3-2-1 rule limits the range of a collision domain by limiting the propagation delay to a "reasonable" amount of time. The rule breaks down as follows:
5 - the number of network segments
4 - the number of repeaters needed to join the segments into one collision domain
3 - the number of network segments that have active (transmitting) devices attached
2 - the number of segments that do not have active devices attached
1 - the number of collision domains
Because the last two elements of the recipe follow naturally from the others, this rule is sometimes also known as the "5-4-3" rule for short.
| Is This Answer Correct ? | 12 Yes | 2 No |
Answer / jitendera kumar sinha
Ethernet and IEEE 802.3 implement a rule, known as the 5-4-
3 rule is also known as the IEEE way, for the number of
repeaters and segments on shared access Ethernet backbones
in a tree topology. The 5-4-3 rule divides the network into
two types of physical segments: populated (user) segments,
and unpopulated (link) segments. The 5-4-3 rule is also
known as the IEEE way and is sometimes compared to the
Ethernet way which is having 2 repeaters on the single
network without having any hosts connected to a repeater.
5 Segments
4 Repeaters
3 Populated Segments
2 Unpopulated Segments
1 Collision Domain
| Is This Answer Correct ? | 1 Yes | 0 No |
When dr communicate with bdr which multicast ip it use?
Which type for communication switch do?
In configuring a router, what command must be used if you want to delete the configuration data that is stored in the NVRAM?
let there are three switch and there are 3 ree valn craed on each switch that is vlan 2 on first switch valn 3 on 2nd switch and vlan 4 is cretaed on switch 3 i have implemnted intervlan routin through ciso switchses. the router is conected through its fa0/1 port by one switch and and the two switch are trunked with each other now question is that we want to comuniacte betwwen vlan but does alse want that only vlan 2 is allow to access internet (ISP)which is conected through s0 interface of router.and no any vlan can access that internet.what should be solution.
What is the difference between rip and igrp?
What causes a triggered update to reset the router hold-down timer?
Explain isakmp ?
The Integrated Services Digital Network (ISDN) Basic Rate Interface (BRI) provides which of the following? A.) 1.544 Mbps B.) 23B + 1D Channel C.) 24B + 1D Channel D.) 2B + 1D Channel E.) 23B + the Disney Channel
Which layer are called upper layer?
Identify the effect of Ctrl-Z? A.) Exits back to privileged exec mode B.) Disconnect from the router C.) Abort the ping operation D.) Exits privileged exec mode
Which of the following protocols are used for logical network addressing? A.) IP B.) TCP C.) ARP D.) ICMP E.) RARP F.) BootP
Which of the follow do not belong to the customer? A.) CO B.) DCE C.) Router D.) CPE E.) Demarc F.) DTE