5-4-3 Rule

Ethernet and IEEE 802.3 implement a rule, known as the 5-4-3 rule, for the number of repeaters and segments on shared access Ethernet backbones in a tree topology.

The 5-4-3 rule divides the network

The 5-4-3 rule divides the network into two types of physical segments: populated (user) segments, and unpopulated (link) segments. User segments have users’ systems connected to them. Link segments are used to connect the network’s repeaters together. The rule mandates that between any two nodes on the network, there can only be a maximum of five segments, connected through four repeaters, or concentrators, and only three of the five segments may contain user connections.

Requires a Signal to Reach Every Part of the Network

The Ethernet protocol requires that a signal sent out over the LAN reach every part of the network within a specified length of time. The 5-4-3 rule ensures this. Each repeater that a signal goes through adds a small amount of time to the process, so the rule is designed to minimize transmission times of the signals.

The 5-4-3 rule — which was created when Ethernet, 10Base5, and 10Base2 were the only types of Ethernet network available — only applies to shared-access Ethernet backbones. A switched Ethernet network should be exempt from the 5-4-3 rule because each switch has a buffer to temporarily store data and all nodes can access a switched Ethernet LAN simultaneously.

Recommended Reading: Webopedia’s Ethernet Designations chart.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.

Related Articles

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable cloud VPS solutions for businesses. It claims to change the status...

Data Visualization

Data visualization is the graphic representation of data so that analysts, readers, clients, and stakeholders can more easily see the implications of the raw...

RSA SecurID

RSA SecurID is multi-factor authentication (MFA) technology used to protect network resources, such as applications and websites. Its purpose is to mitigate risk and...

Logo

A logo is a symbol, mark, or other visual element that a company uses in place of or in conjunction with its business title....

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...