How does the cut-through switching technique work?
A.) By using broadcast address as source addresses
B.) The switch waits only for the header to be received
before it checks
the destination address and starts forwarding the packets
C.) The LAN switch copies the entire frame into its onboard
buffers and
then looks up the destination address in its forwarding, or
switching,
table and determines the outgoing interface
D.) By using a Class I repeater in a collision domain
Answers were Sorted based on User's Feedback
Answer / guest
Answer: B
Cut-Through switching copies only the destination address
which is the
first 6 bytes after the frame preamble into its buffer. The
LAN switch
then looks up the destination address in its switching table and
determines the outgoing interface. The frame is then sent to the
interface. A cut-through switch provides reduced latency
because it
begins to forward the frame as soon as it read the
destination address
and determines the outgoing interface.
| Is This Answer Correct ? | 6 Yes | 0 No |
Answer / guest
To response to above answer,
I think he had a great point, a cut through technique is
best for killing those obstacles. I am totally agreed!
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / cut through
Cut - through works at a simple behavior at such
that, you can use an knife to cut through the obstacles
on the way, then everything will be much easier.
So, next time when you met someone whom you don't like,
remember to perform cut-through to get rid of him/her.
| Is This Answer Correct ? | 0 Yes | 2 No |
Differentiate between broadcast domain and collision domain
What is Cisco's default encapsulation method on serial interfaces? A.) ANSI B.) Cisco C.) Q933a D.) HDLC
Identify the purpose of the wildcard mask? A.) Match a certain portion of the IP address while ignoring the rest of the address B.) Determine the class of the IP address C.) Determine the network portion of an IP address D.) Hide the host portion of an IP address
You need to come up with a TCP/IP addressing scheme for your company. How many network IDs must you allow for when you define the subnet mask for the network? A.) One for each WAN link B.) One for each router interface C.) One for each NIC installed in each client D.) One for each subnet with hosts E.) One for each host ID
Which of the following are logged when IP access list logging is enabled? A.) source address B.) protocol C.) source port D.) destination address E.) access list number F.) destination port
What is the best Difference between RIP, OSPF, EIGRP
If you are running Token Ring with Novell IPX routing, which encapsulation should you use? A.) SAP B.) SNAP C.) 802.5 D.) 802.2
What is the logical link control?
What is the difference between bus topology and hub?
PLACE YOURS QUESTION HERE I ALSWYS BE HERE FROM 9 AM TO 6PM SO U CAN FIND YOUR ANSWER QUICKLY.IF I KNOW THEN ? JJIITTEENNDDEERRAA SSIINNHHAA
Identify the command to view the configuration-register value? A.) show register B.) display config-register C.) show config D.) show version
hi shain i have got some virus who make the .exe file that is duplicate of original file on my server 2007 windows can u suggest me any anti virus help help please help