Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is the 5-4-3-2-1 rule of network design?

Answers were Sorted based on User's Feedback



What is the 5-4-3-2-1 rule of network design?..

Answer / tushar

he 5-4-3-2-1 rule embodies a simple recipe for network design. It may not be easy to find examples in practice, but this rule neatly ties together several important elements of design theory.
To understand this rule, it's first necessary to understand the concepts of collision domains and propagation delay. Collision domains are portions of a network. When a network packet is transmitted over Ethernet, for example, it is possible for another packet from a different source to be transmitted close enough in time to the first packet to cause a collision on the wire. The total range over which a packet can travel and potentially collide with another is its collision domain.
Propagation delays are a property of the physical medium (e.g., Ethernet). Propagation delays help determine how much of a time difference between the sending of two packets on a collision domain is "close enough" to actually cause a collision. The greater the propagation delay, the increased likelihood of collisons.

The 5-4-3-2-1 rule limits the range of a collision domain by limiting the propagation delay to a "reasonable" amount of time. The rule breaks down as follows:

5 - the number of network segments
4 - the number of repeaters needed to join the segments into one collision domain
3 - the number of network segments that have active (transmitting) devices attached
2 - the number of segments that do not have active devices attached
1 - the number of collision domains
Because the last two elements of the recipe follow naturally from the others, this rule is sometimes also known as the "5-4-3" rule for short.

Is This Answer Correct ?    12 Yes 2 No

What is the 5-4-3-2-1 rule of network design?..

Answer / jitendera kumar sinha

Ethernet and IEEE 802.3 implement a rule, known as the 5-4-
3 rule is also known as the IEEE way, for the number of
repeaters and segments on shared access Ethernet backbones
in a tree topology. The 5-4-3 rule divides the network into
two types of physical segments: populated (user) segments,
and unpopulated (link) segments. The 5-4-3 rule is also
known as the IEEE way and is sometimes compared to the
Ethernet way which is having 2 repeaters on the single
network without having any hosts connected to a repeater.

5 Segments
4 Repeaters
3 Populated Segments
2 Unpopulated Segments
1 Collision Domain

Is This Answer Correct ?    1 Yes 0 No

What is the 5-4-3-2-1 rule of network design?..

Answer / neeraj

this is the ring topologies method.

Is This Answer Correct ?    3 Yes 6 No

Post New Answer

More CCNA Interview Questions

Which command will display the encapsulation type on interface serial 0? A.) show interface s0 B.) show all C.) show int s0 encap D.) show encap s0 E.) show encap

1 Answers   Cisco,


There is an emergency fall-back 'skeleton' IOS stored in read only memory on all Cisco routers. What command would make the router load the IOS from Read Only Memory? A.) reload rom B.) boot system rom C.) load ios bootflash D.) load ios rom E.) bootsystem skeleton

3 Answers  


What are 10baset ethernet lans?

0 Answers  


What is the different between console port and auxiliary port?

0 Answers  


What does the IPX maximum-path command do? A.) Allows you to disable the TTL on an IPX packet B.) This parameter is only used in NLSP routing C.) Sets the maximum metric that can appear in the routing table D.) Configures round robin load sharing over multiple equal metric paths (parallel paths)

1 Answers  


What is the size of an ip address?

0 Answers  


Which two commands show your access lists? (Choose two) A. show filters B. show access-lists C. show ip access-lists D. show running-config

2 Answers  


Tell us the name of algorithm of eigrp protocol?

0 Answers  


Which three pieces of CDP information about neighbours routers are displayed on your console terminal? (Choose three) A. neighbours router a host name B. the neighbours router a hardware platform C. up to one address for each protocol supported D. up to two addresses for each protocol supported

1 Answers  


How do areas benefit a link state inter network?

0 Answers  


Can you explain tunneling?

0 Answers   CCIE,


The two sublayers of the IEEE Data Link Layer are which of the following? A.) Link and Logical Control B.) Data Link and LLC C.) Logical Link Control and Media Access Control D.) Data Link and MAC

3 Answers  


Categories