Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


How does the cut-through switching technique work?

A.) By using broadcast address as source addresses

B.) The switch waits only for the header to be received
before it checks

the destination address and starts forwarding the packets

C.) The LAN switch copies the entire frame into its onboard
buffers and

then looks up the destination address in its forwarding, or
switching,

table and determines the outgoing interface

D.) By using a Class I repeater in a collision domain

Answers were Sorted based on User's Feedback



How does the cut-through switching technique work? A.) By using broadcast address as source addre..

Answer / guest

Answer: B

Cut-Through switching copies only the destination address
which is the

first 6 bytes after the frame preamble into its buffer. The
LAN switch

then looks up the destination address in its switching table and

determines the outgoing interface. The frame is then sent to the

interface. A cut-through switch provides reduced latency
because it

begins to forward the frame as soon as it read the
destination address

and determines the outgoing interface.

Is This Answer Correct ?    6 Yes 0 No

How does the cut-through switching technique work? A.) By using broadcast address as source addre..

Answer / guest

To response to above answer,

I think he had a great point, a cut through technique is
best for killing those obstacles. I am totally agreed!

Is This Answer Correct ?    1 Yes 0 No

How does the cut-through switching technique work? A.) By using broadcast address as source addre..

Answer / cut through

Cut - through works at a simple behavior at such
that, you can use an knife to cut through the obstacles
on the way, then everything will be much easier.

So, next time when you met someone whom you don't like,
remember to perform cut-through to get rid of him/her.

Is This Answer Correct ?    0 Yes 2 No

Post New Answer

More CCNA Interview Questions

What is the difference between arp and rarp?

0 Answers  


Write out a config to permit only the below MAC address to pass traffic through a port on your switch. in another way writhe a confrigation which permit only mac address trfaic through a port of your switch

3 Answers  


Which three basic switch functions increase available bandwidth on the networks? (Choose three) A. loop avoidance B. address learning C. hop count limiting D. broadcast filtering E. packet forward/filtering F. broadcast packet hop count learning/forward/filtering

1 Answers  


Bridges work at what layer of the OSI model? A.) Data Link B.) Network C.) Physical D.) Application

12 Answers   KVS, PGT,


Which addresses are INCORRECTLY paired with their class? A. 128 to 191, Class B B. 192 to 223 Class B C. 128 to 191, Class C D. 192 to 223, Class C

3 Answers  


Which statement is true? A. While bridges are used to segment networks, they will not isolate broadcast or multicast packets. B. A bridge looks at every packet within its network segment and works like a hub re-broadcasting the packet if the destination is within its network segment. C. A bridge maintains a table of the IP addresses of the hosts within its network segment and forwards the packet directly to the destination based upon the IP address. D. A bridge resets the hop count by keeping all packets within the network segment. Only packets addressed to a specific destination host outside the network segment are allowed to pass through the bridge.

1 Answers  


Explain what are partial updates?

0 Answers  


Which OSI layer handles physical addresses and network topology? A.) Presentation B.) Physical C.) Transport D.) Application E.) Data-Link F.) Network

2 Answers  


Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2

1 Answers  


Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed

1 Answers  


IP extended access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) all of the above C.) protocol D.) source address E.) port

3 Answers  


Which protocol can do load balancing on unequal cost also?

0 Answers  


Categories