How does a switch use store and forward?

A.) By using a Class I repeater in a collision domain

B.) The LAN switch copies the entire frame into its onboard
buffers and

then looks up the destination address in its forwarding, or
switching,

table and determines the outgoing interface

C.) By using broadcast addresses as source addresses

D.) The switch waits only for the header to be received
before it checks

the destination address and starts forwarding the packets



How does a switch use store and forward? A.) By using a Class I repeater in a collision domain ..

Answer / guest

Answer: B

Store-and-Forward switching copies the entire frame into its
buffer and

computes the CRC. If a CRC error is detected, the frame is
discarded, or

if the frame is a runt (less than 64 bytes including the
CRC) or a giant

(more than 1518 bytes including the CRC). The LAN switch
then looks up

the destination address in its switching table and
determines the

outgoing interface. The frame is then forwarded to the outgoing

interface. Cisco Catalyst 5000 switches uses the
Store-and-Forward

method. The problem with Store-and-Forward switching is
latency is

increased. Latency also varies with the size of the frame.
The larger

the frame, the more latency associated. This of course is
due to the

fact that the entire frame is copied into its buffer before
being

forwarded.

Is This Answer Correct ?    7 Yes 0 No

Post New Answer

More CCNA Interview Questions

In STP the Root Bridge Sends the BPDU in Every 2 Sec,In BPDU What kind of Information is i.e. What kind of information BPDU Contains?

3 Answers  


what is vlan and how will you configure vlan on 3650 switch and how many valn can you create on that switch

3 Answers   Aptron, Volvo,


When we use router?

0 Answers  


ccna syallabus and what is the mean by troubble shooting

2 Answers   IBM,


whats the routing protocol supporting in both juniper , cisco routers.

10 Answers   HCL,






You are logged into a router, what command would show you the IP addresses of routers connected to you? A. show cdp neighbors detail B. show run C. show neighbors D. show cdp

2 Answers  


what is the concept of HA and FA in VPN tunneling?

0 Answers   CCIE,


Which of the following provide connection-oriented transport to upper layer protocols? A.) SPX B.) RIP C.) NLSP D.) NCP

1 Answers  


Identify 3 IP applications? A.) AURP B.) ARP C.) Telnet D.) SMTP E.) DNS F.) RARP

2 Answers  


What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

3 Answers  


- What is EGIRP and IGRP - How EGIRP and IGRP works

1 Answers   Airtel,


Name the 2 protocols are in wan technology?

0 Answers  


Categories