Switching methods include cut-through, store and forward,
and a modified version of the first two methods. Which
statement about switching methods is true?
A. The store and forward method has low latency
B. The cut through method of switching has high latency
C. The modified version holds the packet in memory until 50
percent of the packet reaches the switch
D. The modified version holds the packet in memory until the
data spoon of the packet reaches the switch
Answers were Sorted based on User's Feedback
Answer / shahid
Store and forward stores complete frame in buffer so it is memory intensive and I think this will take time also.
Cut-through doesn't store complete frame, it looks till destination MAC address and forwards, downside is that the corrupt frame will also be forwarded (in store & forward if frame is corrupted, not get forwarded)
In modified cut-through first 64 bytes are checked and then frame is forwarded (corrupt frame is not forwarded also).
Is This Answer Correct ? | 0 Yes | 0 No |
You want to clear the outputs on your serial interface showing errors on the interface. Which command do you type?
hi shain can u send me some detail about bgp so that i can enhance my knowledge over bgp and can you also teach me about the process of suppernating. now what i am thinking that this could be last visit on that site overhere.so please mail that short of thing on my gmail id i am requesting to all of the visitor that please send theire doubt or question to my new gmail id which is jitendera.ccnainterview@gmail.com.i will try to solve it if i am capable to do it Wishing all of you for great future Jitendera kaumar sinha
Which command we use for ping in ipv6?
What is the protocol and what is the second part of the following network address? 172.16.0.254 mask - 255.255.0.0 A. IPX MAC address B. IP Class C directed broadcast C. Private IP address node number D. Public IP directed broadcast E. Private IP directed broadcast
Novell NetWare has an Ethernet frame type called Ethernet_II. What is the matching Cisco command line keyword for this encapsulation method? A.) dix B.) sap C.) arpa D.) gns E.) snap F.) novell-ether
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity
What command displays detail information about the OSPF interfaces, including the authentication method?
How to crimping cat cable without using crimping and any tool...........?
Which statement is true when a broadcast is sent in an Ethernet/802.3 ITAN? A. The ip shored used is 255.255.255.0 B. The IP address used is 255.255.255.255 C. The MAC address used is 00 00 00 00 00 00 D. The MAC address used is FF FF FF FF FF FF
Why is UDP lease favored when compared to TCP?
Identify the command to configure the router to boot from an alternate IOS located in flash? A.) boot system flash IOS.exe B.) boot system tftp IOS.exe 172.16.5.1 C.) boot system alternate IOS.exe D.) boot system rom IOS.exe
Which port are used by Viruses? TCP or UDP?