Solved

Fast Ethernet Topology Limitations

Posted on 2004-09-28
8
321 Views
Last Modified: 2013-11-09
I have a little experience with ethernet LANs. I usually adhere to the 5-4-3 rule when expanding my LANs. However, what are the limiting factors when cascading fast ethernet switches? Can the total length of Cat 5 ever excede 400 meters between any two nodes? I'm looking for guidelines / specs. I've been searching the internet and I seem to find conflicting opinions. Any general guidlines will help. Perhaps I need to incorporate a bridge???
0
Comment
Question by:NAFiamengo
8 Comments
 
LVL 15

Expert Comment

by:Yan_west
Comment Utility
Maximum length of a cat5 cable would be 100M.. you can add repeater or additional switches to do it..
0
 
LVL 15

Expert Comment

by:Yan_west
Comment Utility
If you need something to go farther, I would use Monomode optic fiber..
0
 

Author Comment

by:NAFiamengo
Comment Utility
100 meters per segment - But isn't the maximum 4 segments at 100 meters each for a total of 400 meters?
0
 
LVL 15

Expert Comment

by:Yan_west
Comment Utility
Yes, the maximum number I've seen is 4 cascaded hubs/switches..
0
Free camera licenses with purchase of My Cloud NAS

Milestone Arcus software is compatible with thousands of industry-leading cameras for added flexibility. Upon installation on your My Cloud NAS, you will receive two (2) camera licenses already enabled in the software. And for a limited time, get additional camera licenses FREE.

 
LVL 11

Assisted Solution

by:PennGwyn
PennGwyn earned 300 total points
Comment Utility
Uh, that's hubs/REPEATERS.

Hubs and repeaters are (generally) line-speed devices, and the 3-4-5 rule is designed to limit the physical size of the collision domain to ensure that any collision is detected before the sending station thinks it has successfully completed transmission of the smallest legal packet.

Switches are w whole different story.  They buffer and/or stroe-and-forward, adding latency, but they also put each port in its own collision domain (which is, of course, subject to the same 3-4-5 rule as above).

The governing criterion with a switched network is the size of the *broadcast* domain, and of the spanning tree.  A typical good rule of thumb is that no node should be more than 9 bridges away from any other, and the spanning tree should be no more than 5 bridges deep.  If you need to exceed these numbers, it's almost certainly time to put in a routed backbone.

0
 
LVL 1

Expert Comment

by:trimixdiver
Comment Utility
IF you are trying to get 400m using cat5 then every 100m you will need a switch. Better bet is using Multimode fiber optics. Put a switch on each end or a simple transparent media converter. With FX you can reach 2km and the fiber can also be used for gigabit
0
 
LVL 2

Expert Comment

by:TeeSeePeeEyePee
Comment Utility
If you want to go a step further and extend the fabric of your switching backbone between closets (and eventually even between sites) it would be worth checking out 3Com's XRN technology:

http://www.3com.com/other/pdfs/products/en_US/500928.pdf
0
 
LVL 1

Accepted Solution

by:
bluelip earned 200 total points
Comment Utility
The max length was designaed for more reasons than just signal degradation.

Most newer equipment can discern a signal on lengths longer than those given.

The problem comes about when a collision occurs. It takes too long for the 'blocking' signal to travel the length of the wire and reach each device in the collision domain.  In this case, some devices may not know that the data it just sent was part of a collision.

Rare? yes, but it's still there.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

I recently purchased a Bluetooth headset called the Music Jogger (model BSH10). The control buttons on it look like this: One of my goals is to use it as the microphone and speakers for Skype calls. In that respect, it works well. However, I …
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now