Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is the 5-4-3-2-1 rule of network design?

Answers were Sorted based on User's Feedback



What is the 5-4-3-2-1 rule of network design?..

Answer / tushar

he 5-4-3-2-1 rule embodies a simple recipe for network design. It may not be easy to find examples in practice, but this rule neatly ties together several important elements of design theory.
To understand this rule, it's first necessary to understand the concepts of collision domains and propagation delay. Collision domains are portions of a network. When a network packet is transmitted over Ethernet, for example, it is possible for another packet from a different source to be transmitted close enough in time to the first packet to cause a collision on the wire. The total range over which a packet can travel and potentially collide with another is its collision domain.
Propagation delays are a property of the physical medium (e.g., Ethernet). Propagation delays help determine how much of a time difference between the sending of two packets on a collision domain is "close enough" to actually cause a collision. The greater the propagation delay, the increased likelihood of collisons.

The 5-4-3-2-1 rule limits the range of a collision domain by limiting the propagation delay to a "reasonable" amount of time. The rule breaks down as follows:

5 - the number of network segments
4 - the number of repeaters needed to join the segments into one collision domain
3 - the number of network segments that have active (transmitting) devices attached
2 - the number of segments that do not have active devices attached
1 - the number of collision domains
Because the last two elements of the recipe follow naturally from the others, this rule is sometimes also known as the "5-4-3" rule for short.

Is This Answer Correct ?    12 Yes 2 No

What is the 5-4-3-2-1 rule of network design?..

Answer / jitendera kumar sinha

Ethernet and IEEE 802.3 implement a rule, known as the 5-4-
3 rule is also known as the IEEE way, for the number of
repeaters and segments on shared access Ethernet backbones
in a tree topology. The 5-4-3 rule divides the network into
two types of physical segments: populated (user) segments,
and unpopulated (link) segments. The 5-4-3 rule is also
known as the IEEE way and is sometimes compared to the
Ethernet way which is having 2 repeaters on the single
network without having any hosts connected to a repeater.

5 Segments
4 Repeaters
3 Populated Segments
2 Unpopulated Segments
1 Collision Domain

Is This Answer Correct ?    1 Yes 0 No

What is the 5-4-3-2-1 rule of network design?..

Answer / neeraj

this is the ring topologies method.

Is This Answer Correct ?    3 Yes 6 No

Post New Answer

More CCNA Interview Questions

Explain the types of ospf configuration?

0 Answers  


Wild card mask always in odd value or even?

0 Answers  


What is the command to allow you to type Tokyo instead of the IP address 172.16.30.1 to access a router named Tokyo? A.) config t, ip host Tokyo 172.16.30.1 B.) config t, ip hostname Tokyo 172.16.30.1 C.) config t, hostname Tokyo 172.16.30.1 D.) config t, ip hostname 172.16.30.1 Tokyo

1 Answers  


IP RIP routing is conferred on a router but not all interfaces attach to RIP networks. What should you use to prevent all RIP routing updates from being sent through selecedc interfaces without using access lists? A. passive route B. default routes C. passive interface D. route update filtering

2 Answers  


As a system administrator, you perform an extended ping at the privileged EXEC prompt. As part of the display, you see "Set DF bit in IP header? [yes] :" What would happen if you answered no at the prompt. A. This lets the router fragment the packet. B. It tells the router not to fragment the packet. C. This lets the router direct the packet to the destination it finds in its routing table. D. It tell the router to send the packet to the next hop router.

1 Answers  


What is Spanning Tree Protocol and how it work? I know it is - STP is Spanning tree Protocol. It Stops the looping in the network? How STP work? How it stop Looping in network?

3 Answers   IBM,


Which ISDN protocol prefix specifies switching and signaling? A.) I B.) E C.) Q D.) S

1 Answers  


in stead of 0.0.0.0 wild card mask what u can write after ip?

0 Answers  


What is the default behavior of access-list?

0 Answers  


Identify the command to configure the IP address 172.16.100.5 255.255.255.0? A.) Router(config-if)# ip address 172.16.100.5 255.255.255.0 B.) Router(config)# ip address 172.16.100.5 C.) Router# ip address 172.16.100.5 255.255.255.0 D.) Router(config)# ip address 172.16.100.5 255.255.255.0

2 Answers  


How do you depict an IP address?

0 Answers  


what is the difference between a passive and active hub?? which is better ??

12 Answers  


Categories