How does the cut-through switching technique work?
A.) By using broadcast address as source addresses
B.) The switch waits only for the header to be received
before it checks
the destination address and starts forwarding the packets
C.) The LAN switch copies the entire frame into its onboard
buffers and
then looks up the destination address in its forwarding, or
switching,
table and determines the outgoing interface
D.) By using a Class I repeater in a collision domain
Answers were Sorted based on User's Feedback
Answer / guest
Answer: B
Cut-Through switching copies only the destination address
which is the
first 6 bytes after the frame preamble into its buffer. The
LAN switch
then looks up the destination address in its switching table and
determines the outgoing interface. The frame is then sent to the
interface. A cut-through switch provides reduced latency
because it
begins to forward the frame as soon as it read the
destination address
and determines the outgoing interface.
| Is This Answer Correct ? | 6 Yes | 0 No |
Answer / guest
To response to above answer,
I think he had a great point, a cut through technique is
best for killing those obstacles. I am totally agreed!
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / cut through
Cut - through works at a simple behavior at such
that, you can use an knife to cut through the obstacles
on the way, then everything will be much easier.
So, next time when you met someone whom you don't like,
remember to perform cut-through to get rid of him/her.
| Is This Answer Correct ? | 0 Yes | 2 No |
Which command will display adjacent routers found by the Cisco Discovery Protocol? A.) show all B.) show cdp entry C.) show ip neighbors D.) show cdp neighbor detail E.) show cdp neighbor F.) show neighbor
Which command verifies encapsulation as well as Layer 1 and Layer 2 statistics on a router configured for Frame Relay? A. show ip B. show interface C. show statistics D. show frame-relay
Hi,can anyone explain me in brief about ccna security. waiting for your answer
What is convergence time? A.) The update time B.) The time it takes to reload a router C.) The time it takes for a packet to reach its destination D.) The time is takes for all routers update their tables after a change takes place
What does -1 signify in an extended IPX access list? A. permit this host B. deny this host C. permit only this subnet D. any host or any network
Which OSI Reference Layer controls application to application communication? A.) Datalink B.) Network C.) Transport D.) Session E.) Physical
Which addresses are valid host addresses? A. 201.222.5.17 B. 201.222.5.18 C. 201.222.5.16 D. 201.222.5.19 E. 201.222.5.31
What is the maximum hop count for Link-State protocols? A.) 15 B.) there is no hop count limit C.) 256 D.) 16
Tell me how many hop counts are by default and how much you can increase in eigrp protocol?
Which routing protocols uses connection-oriented routing updates? A.) IGRP B.) UDP C.) RIP D.) IP E.) BGP
How many LMI types are available on Cisco routers? A.) Four B.) Two C.) Five D.) Three
Identify command that configures 'Cisco1' as a secret password? A.) Router(config)# enable secret password Cisco1 B.) Router(config)# enable secret cisco1 C.) Router(config)# enable password Cisco1 D.) Router(config)# enable secret Cisco1