How does a switch use store and forward?
A.) By using a Class I repeater in a collision domain
B.) The LAN switch copies the entire frame into its onboard
buffers and
then looks up the destination address in its forwarding, or
switching,
table and determines the outgoing interface
C.) By using broadcast addresses as source addresses
D.) The switch waits only for the header to be received
before it checks
the destination address and starts forwarding the packets
Answer / guest
Answer: B
Store-and-Forward switching copies the entire frame into its
buffer and
computes the CRC. If a CRC error is detected, the frame is
discarded, or
if the frame is a runt (less than 64 bytes including the
CRC) or a giant
(more than 1518 bytes including the CRC). The LAN switch
then looks up
the destination address in its switching table and
determines the
outgoing interface. The frame is then forwarded to the outgoing
interface. Cisco Catalyst 5000 switches uses the
Store-and-Forward
method. The problem with Store-and-Forward switching is
latency is
increased. Latency also varies with the size of the frame.
The larger
the frame, the more latency associated. This of course is
due to the
fact that the entire frame is copied into its buffer before
being
forwarded.
Is This Answer Correct ? | 7 Yes | 0 No |
In STP the Root Bridge Sends the BPDU in Every 2 Sec,In BPDU What kind of Information is i.e. What kind of information BPDU Contains?
what is vlan and how will you configure vlan on 3650 switch and how many valn can you create on that switch
When we use router?
ccna syallabus and what is the mean by troubble shooting
whats the routing protocol supporting in both juniper , cisco routers.
You are logged into a router, what command would show you the IP addresses of routers connected to you? A. show cdp neighbors detail B. show run C. show neighbors D. show cdp
what is the concept of HA and FA in VPN tunneling?
Which of the following provide connection-oriented transport to upper layer protocols? A.) SPX B.) RIP C.) NLSP D.) NCP
Identify 3 IP applications? A.) AURP B.) ARP C.) Telnet D.) SMTP E.) DNS F.) RARP
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
- What is EGIRP and IGRP - How EGIRP and IGRP works
Name the 2 protocols are in wan technology?