How does the cut-through switching technique work?
A.) By using broadcast address as source addresses
B.) The switch waits only for the header to be received
before it checks
the destination address and starts forwarding the packets
C.) The LAN switch copies the entire frame into its onboard
buffers and
then looks up the destination address in its forwarding, or
switching,
table and determines the outgoing interface
D.) By using a Class I repeater in a collision domain
Answers were Sorted based on User's Feedback
Answer / guest
Answer: B
Cut-Through switching copies only the destination address
which is the
first 6 bytes after the frame preamble into its buffer. The
LAN switch
then looks up the destination address in its switching table and
determines the outgoing interface. The frame is then sent to the
interface. A cut-through switch provides reduced latency
because it
begins to forward the frame as soon as it read the
destination address
and determines the outgoing interface.
| Is This Answer Correct ? | 6 Yes | 0 No |
Answer / guest
To response to above answer,
I think he had a great point, a cut through technique is
best for killing those obstacles. I am totally agreed!
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / cut through
Cut - through works at a simple behavior at such
that, you can use an knife to cut through the obstacles
on the way, then everything will be much easier.
So, next time when you met someone whom you don't like,
remember to perform cut-through to get rid of him/her.
| Is This Answer Correct ? | 0 Yes | 2 No |
What is the difference between arp and rarp?
Write out a config to permit only the below MAC address to pass traffic through a port on your switch. in another way writhe a confrigation which permit only mac address trfaic through a port of your switch
Which three basic switch functions increase available bandwidth on the networks? (Choose three) A. loop avoidance B. address learning C. hop count limiting D. broadcast filtering E. packet forward/filtering F. broadcast packet hop count learning/forward/filtering
Bridges work at what layer of the OSI model? A.) Data Link B.) Network C.) Physical D.) Application
12 Answers KVS, PGT,
Which addresses are INCORRECTLY paired with their class? A. 128 to 191, Class B B. 192 to 223 Class B C. 128 to 191, Class C D. 192 to 223, Class C
Which statement is true? A. While bridges are used to segment networks, they will not isolate broadcast or multicast packets. B. A bridge looks at every packet within its network segment and works like a hub re-broadcasting the packet if the destination is within its network segment. C. A bridge maintains a table of the IP addresses of the hosts within its network segment and forwards the packet directly to the destination based upon the IP address. D. A bridge resets the hop count by keeping all packets within the network segment. Only packets addressed to a specific destination host outside the network segment are allowed to pass through the bridge.
Explain what are partial updates?
Which OSI layer handles physical addresses and network topology? A.) Presentation B.) Physical C.) Transport D.) Application E.) Data-Link F.) Network
Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2
Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed
IP extended access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) all of the above C.) protocol D.) source address E.) port
Which protocol can do load balancing on unequal cost also?