Explain 5-4-3 rule?



Explain 5-4-3 rule?..

Answer / anil

Ethernet and IEEE 802.3 implement a rule, known as the 5-4-3
rule, for the number of repeaters and segments on shared
access Ethernet backbones in a tree topology. The 5-4-3 rule
divides the network into two types of physical segments:
populated (user) segments, and unpopulated (link) segments.
User segments have users' systems connected to them. Link
segments are used to connect the network's repeaters
together. The rule mandates that between any two nodes on
the network, there can only be a maximum of five segments,
connected through four repeaters, or concentrators, and only
three of the five segments may contain user connections.

The Ethernet protocol requires that a signal sent out over
the LAN reach every part of the network within a specified
length of time. The 5-4-3 rule ensures this. Each repeater
that a signal goes through adds a small amount of time to
the process, so the rule is designed to minimize
transmission times of the signals.

The 5-4-3 rule -- which was created when Ethernet, 10Base5,
and 10Base2 were the only types of Ethernet network
available -- only applies to shared-access Ethernet
backbones. A switched Ethernet network should be exempt from
the 5-4-3 rule because each switch has a buffer to
temporarily store data and all nodes can access a switched
Ethernet LAN simultaneously.

Is This Answer Correct ?    12 Yes 1 No

Post New Answer

More Networking AllOther Interview Questions

what is Voltage levels of rs232x?

0 Answers  


What EMC hardware have you worked on? (like DMX3/4 etc) --SAN

0 Answers  


which is true a)bridge connects dissimiler LAN and protocol insensitive b)router connects dissimiler LAN and protocol insensitive c)gateway connects dissimiler LAN and protocol insensitive d)none of the above

2 Answers  


Difference Between DDR1, DDR2 and DDR3 memories.

0 Answers   Amdocs,


Which are the different network toplogies ?

8 Answers   Honeywell,






why we need MAC address in data link layer?

2 Answers   TeleTech,


1. What ports does FTP traffic travel over? 2. What ports does mail traffic utilize? 3. What ports do HTTP and HTTPS use? 4. Why is NTP required in an NFS network? 5. Name some common mal software on the server side 6. What is CPAN? How do you access it? 7. What is PEAR? 8. What advantages does mod_perl have over a perl CGI? 9. What is required to do SSL in Apache 1.x? 10. What is Tcl? 11. What is a servlet engine/container? 12. What is BIND? 13. Name the steps to setup a slave zone in BIND 14. Name the steps to setup a primary zone in BIND 15. What commands would you use under Solaris or Linux to modify/view an LDAP tree?

0 Answers   TCS,


Write two ways in which computer applications differ from network applications ?

0 Answers  


One of my friend told that M.C.A people are not prefered by the companies for networking side requirement is it true? please post your answer.because i want to make my career at networking side.

4 Answers  


Tell the correct definition of router, hub and switch and where do we use these?

2 Answers   Genpact,


Why data link layer is divided into two layers?

2 Answers   HCL,


Explain FDDI

0 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)