What is difference between Store-and-Forward, cut-through,
Fragment-Free Method?
Answers were Sorted based on User's Feedback
Answer / guest
these are all the switch types based on their working....
1. Cut through: the switch checks the frame only upto
13bytes and as it learns the destination address, it starts
forwarding the frame....lowest delay but is less reliable as
there is no error checking.
2. Fragment Free (Modified Cut-through): in this switches
checks the frame upto 64 bytes looking for any errors.if not
found then starts forwarding it to the destination....little
more delay than cut-through-and is some about reliable also.
3. Store and forward: in this type, the switch firstly
stores the entire frame in its buffer memory, after that it
runs error checking mechanism (CRC)to check the integrity of
the frame....if any errors are found it is dropped otherwise
forwarded to the destination. Highest delay and is highly
reliable.....
| Is This Answer Correct ? | 45 Yes | 3 No |
Hi dear My self kapilasdhir my Id is asdhir.kapil@yahoo.com
(chat or mail). i want to know ur id. thnks for answer
questions
| Is This Answer Correct ? | 4 Yes | 8 No |
What is the IEEE specification for Spanning Tree Protocol? A.) 802.9 B.) 803.ud C.) 803 D.) 802.1d
what does PPTP use for encryption and authentication?
Identify the order of the 5 step encapsulation? 1. Create the segment 2. Convert the frame to bits 3. Create the packet 4. Create the frame 5. User creates the data A.) 1,2,4,2,5 B.) 2,1,3,4,5 C.) 5,1,3,4,2 D.) 5,3,4,1,2
Identify the prompt displayed if in privileged exec mode? A.) Router(config)# B.) Router# C.) Router> D.) Router(priv)#
What is the result of using a hierarchical addressing framework? A. increased availability of addresses B. decreased distance between routers C. increased router memory requirements D. no need to maintain routing information
Explain how many types of router?
Which OSI layer provides best effort end to end packet delivery? A.) Data-Link B.) Presentation C.) Network D.) Transport E.) Physical F.) Application
What is the utility of ping?
What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS
There is an emergency fall-back 'skeleton' IOS stored in read only memory on all Cisco routers. What command would make the router load the IOS from Read Only Memory? A.) reload rom B.) boot system rom C.) load ios bootflash D.) load ios rom E.) bootsystem skeleton
A company running RIP V1 protocol on their 2 seperate networks, each nw has 14 routers, if the two nw wants to be merged with each other total no of routers will be 28. but rip metric is hop count(15). What needs to be done if this setup needs to be work ?
Which ipsec rule is used for the olympia branch and what does it define? (Choose two)