How does the cut-through switching technique work?
A.) By using broadcast address as source addresses
B.) The switch waits only for the header to be received
before it checks
the destination address and starts forwarding the packets
C.) The LAN switch copies the entire frame into its onboard
buffers and
then looks up the destination address in its forwarding, or
switching,
table and determines the outgoing interface
D.) By using a Class I repeater in a collision domain
Answers were Sorted based on User's Feedback
Answer / guest
Answer: B
Cut-Through switching copies only the destination address
which is the
first 6 bytes after the frame preamble into its buffer. The
LAN switch
then looks up the destination address in its switching table and
determines the outgoing interface. The frame is then sent to the
interface. A cut-through switch provides reduced latency
because it
begins to forward the frame as soon as it read the
destination address
and determines the outgoing interface.
Is This Answer Correct ? | 6 Yes | 0 No |
Answer / guest
To response to above answer,
I think he had a great point, a cut through technique is
best for killing those obstacles. I am totally agreed!
Is This Answer Correct ? | 1 Yes | 0 No |
Answer / cut through
Cut - through works at a simple behavior at such
that, you can use an knife to cut through the obstacles
on the way, then everything will be much easier.
So, next time when you met someone whom you don't like,
remember to perform cut-through to get rid of him/her.
Is This Answer Correct ? | 0 Yes | 2 No |
1900 Value in which type of access list?
Which two statements about a reliable connection oriented data transfer are true? (Choose two) A. recipients acknolwedge receipt of data B. when tankers are filled to capacity, datagrams are discarded and not retransmitted C. windows are used to control the amount in outstanding unacknowledged data segments D. if the sender a timer expires before receipt of an acknowledgement the sender drops the connection E. The receiving device waits for acknowledgements from the sending device before accepting more data segments
What 2 commands verify end to end communications? A.) Trace B.) debug ip session C.) Ping D.) Route
What is ping? What is the usage of ping?
What are the two types of transmission technology available in ccna?
How do you get help on a command after you have received the % incomplete command response from a switch CLI? A. type "history" to review the prompt before the error B. enter a question mark to display all the console commands C. type help followed by the command to see command parameters D. reenter the command followed by a question mark to view keywords
Which protocol for PPP provides load balancing across multiple links? A. Multilink Protocol (MP) B. Quality C. Magic Number D. Stacker E. Predictor
Identify the purpose of ICMP? A.) Avoiding routing loops B.) Send error and control messages C.) Transporting routing updates D.) Collision detection
Which two statements about frame tagging are true? (Choose two) A. A filtering table is developed for each switch. B. Frame tagging assigns a unique user defined ID to each frame. C. A unique identifier is placed in the header of each frame as it is forwarded between switches. D. Frame tagging is a technique that examines particular information about each frame based on user defined offsets.
As a system administrator, you want to debug igrp but are worried that the "debug IP igrp transaction" command will flood the console. What is the command that you should use? A. debug IP igrp event B. debug IP igrp-events C. debug IP igrp summary D. debug IP igrp events
You have powered on a new router and you want to create an initial configuration. Which mode should you use? A. copy mode B. user mode C. setup mode D. startup mode
What key do you use to view the last command? A.) Left Arrow B.) Space Bar C.) Up Arrow D.) Right Arrow