What is the 5-4-3-2-1 rule of network design?
Answers were Sorted based on User's Feedback
Answer / tushar
he 5-4-3-2-1 rule embodies a simple recipe for network design. It may not be easy to find examples in practice, but this rule neatly ties together several important elements of design theory.
To understand this rule, it's first necessary to understand the concepts of collision domains and propagation delay. Collision domains are portions of a network. When a network packet is transmitted over Ethernet, for example, it is possible for another packet from a different source to be transmitted close enough in time to the first packet to cause a collision on the wire. The total range over which a packet can travel and potentially collide with another is its collision domain.
Propagation delays are a property of the physical medium (e.g., Ethernet). Propagation delays help determine how much of a time difference between the sending of two packets on a collision domain is "close enough" to actually cause a collision. The greater the propagation delay, the increased likelihood of collisons.
The 5-4-3-2-1 rule limits the range of a collision domain by limiting the propagation delay to a "reasonable" amount of time. The rule breaks down as follows:
5 - the number of network segments
4 - the number of repeaters needed to join the segments into one collision domain
3 - the number of network segments that have active (transmitting) devices attached
2 - the number of segments that do not have active devices attached
1 - the number of collision domains
Because the last two elements of the recipe follow naturally from the others, this rule is sometimes also known as the "5-4-3" rule for short.
Is This Answer Correct ? | 12 Yes | 2 No |
Answer / jitendera kumar sinha
Ethernet and IEEE 802.3 implement a rule, known as the 5-4-
3 rule is also known as the IEEE way, for the number of
repeaters and segments on shared access Ethernet backbones
in a tree topology. The 5-4-3 rule divides the network into
two types of physical segments: populated (user) segments,
and unpopulated (link) segments. The 5-4-3 rule is also
known as the IEEE way and is sometimes compared to the
Ethernet way which is having 2 repeaters on the single
network without having any hosts connected to a repeater.
5 Segments
4 Repeaters
3 Populated Segments
2 Unpopulated Segments
1 Collision Domain
Is This Answer Correct ? | 1 Yes | 0 No |
What is hold down time formula of ospf?
Which statement is true regarding full duplex? A.) Allows for transmission and receiving of data simultaneously B.) Only works in a multipoint configuration C.) Does not affect the bandwidth D.) Allows for transmission and receiving of data but not at the same time
Name a major component of the Point-to-Point Protocol (PPP) to negotiate and set up control options on the WAN data link. A.) RFC 1661 B.) High Level Datalink Protocol (HDLC) C.) Challenge Handshake Authentication Protocol (CHAP) D.) SS7 E.) Link Control Protocol (LCP)
What are three benefits of Integrated Services Digital Network (ISDN) (Choose three) A. PVCs are faster and more reliable B. No specialized equipment is required C. Data transfer is faster than typical modems D. Call setup is faster than with standard telephone service E. It carries many types of data tramp such as voice video and data
Mention what are the ranges for the private ips?
What is the diiffernce between windows xp & windows 2000?
6 Answers TCS, Trimax, Trymax, VigaTech,
What is the difference between lan, man, and wan?
Identify 3 characteristics of a MAC address? A.) Burned into the NIC B.) 48 bits long C.) Length is 32 bits D.) Used to deliver the frame to the end device E.) Contains a network portion and a host portion
Which OSI Reference Layer is concerned with logical addressing? A.) Network B.) Transport C.) Datalink D.) Physical E.) Session
What was the key reason the International Organization for Standardization released the OSI model? A. users could access network servers faster B. different vendor networks could work with each other C. the industry could create a standard for how computers work D. network administrators could increase the overall speed of their network
raid can be used in? 1 NT 2 Netware 3 all of above mine answer -NT
Identify the switching method that examines the destination MAC address as the frame is being received then begins forwarding the frame prior to receiving the entire frame? A.) Fragment-free B.) Store and Forward C.) Cut-through D.) Fast forward