What is the 5-4-3-2-1 rule of network design?
Answers were Sorted based on User's Feedback
Answer / tushar
he 5-4-3-2-1 rule embodies a simple recipe for network design. It may not be easy to find examples in practice, but this rule neatly ties together several important elements of design theory.
To understand this rule, it's first necessary to understand the concepts of collision domains and propagation delay. Collision domains are portions of a network. When a network packet is transmitted over Ethernet, for example, it is possible for another packet from a different source to be transmitted close enough in time to the first packet to cause a collision on the wire. The total range over which a packet can travel and potentially collide with another is its collision domain.
Propagation delays are a property of the physical medium (e.g., Ethernet). Propagation delays help determine how much of a time difference between the sending of two packets on a collision domain is "close enough" to actually cause a collision. The greater the propagation delay, the increased likelihood of collisons.
The 5-4-3-2-1 rule limits the range of a collision domain by limiting the propagation delay to a "reasonable" amount of time. The rule breaks down as follows:
5 - the number of network segments
4 - the number of repeaters needed to join the segments into one collision domain
3 - the number of network segments that have active (transmitting) devices attached
2 - the number of segments that do not have active devices attached
1 - the number of collision domains
Because the last two elements of the recipe follow naturally from the others, this rule is sometimes also known as the "5-4-3" rule for short.
| Is This Answer Correct ? | 12 Yes | 2 No |
Answer / jitendera kumar sinha
Ethernet and IEEE 802.3 implement a rule, known as the 5-4-
3 rule is also known as the IEEE way, for the number of
repeaters and segments on shared access Ethernet backbones
in a tree topology. The 5-4-3 rule divides the network into
two types of physical segments: populated (user) segments,
and unpopulated (link) segments. The 5-4-3 rule is also
known as the IEEE way and is sometimes compared to the
Ethernet way which is having 2 repeaters on the single
network without having any hosts connected to a repeater.
5 Segments
4 Repeaters
3 Populated Segments
2 Unpopulated Segments
1 Collision Domain
| Is This Answer Correct ? | 1 Yes | 0 No |
Which command will display the encapsulation type on interface serial 0? A.) show interface s0 B.) show all C.) show int s0 encap D.) show encap s0 E.) show encap
There is an emergency fall-back 'skeleton' IOS stored in read only memory on all Cisco routers. What command would make the router load the IOS from Read Only Memory? A.) reload rom B.) boot system rom C.) load ios bootflash D.) load ios rom E.) bootsystem skeleton
What are 10baset ethernet lans?
What is the different between console port and auxiliary port?
What does the IPX maximum-path command do? A.) Allows you to disable the TTL on an IPX packet B.) This parameter is only used in NLSP routing C.) Sets the maximum metric that can appear in the routing table D.) Configures round robin load sharing over multiple equal metric paths (parallel paths)
What is the size of an ip address?
Which two commands show your access lists? (Choose two) A. show filters B. show access-lists C. show ip access-lists D. show running-config
Tell us the name of algorithm of eigrp protocol?
Which three pieces of CDP information about neighbours routers are displayed on your console terminal? (Choose three) A. neighbours router a host name B. the neighbours router a hardware platform C. up to one address for each protocol supported D. up to two addresses for each protocol supported
How do areas benefit a link state inter network?
Can you explain tunneling?
The two sublayers of the IEEE Data Link Layer are which of the following? A.) Link and Logical Control B.) Data Link and LLC C.) Logical Link Control and Media Access Control D.) Data Link and MAC