Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is difference between Store-and-Forward, cut-through,
Fragment-Free Method?

Answers were Sorted based on User's Feedback



What is difference between Store-and-Forward, cut-through, Fragment-Free Method?..

Answer / guest

these are all the switch types based on their working....

1. Cut through: the switch checks the frame only upto
13bytes and as it learns the destination address, it starts
forwarding the frame....lowest delay but is less reliable as
there is no error checking.

2. Fragment Free (Modified Cut-through): in this switches
checks the frame upto 64 bytes looking for any errors.if not
found then starts forwarding it to the destination....little
more delay than cut-through-and is some about reliable also.

3. Store and forward: in this type, the switch firstly
stores the entire frame in its buffer memory, after that it
runs error checking mechanism (CRC)to check the integrity of
the frame....if any errors are found it is dropped otherwise
forwarded to the destination. Highest delay and is highly
reliable.....

Is This Answer Correct ?    45 Yes 3 No

What is difference between Store-and-Forward, cut-through, Fragment-Free Method?..

Answer / kapilasdhir

Hi dear My self kapilasdhir my Id is asdhir.kapil@yahoo.com
(chat or mail). i want to know ur id. thnks for answer
questions

Is This Answer Correct ?    4 Yes 8 No

Post New Answer

More CCNA Interview Questions

What is the IEEE specification for Spanning Tree Protocol? A.) 802.9 B.) 803.ud C.) 803 D.) 802.1d

1 Answers  


what does PPTP use for encryption and authentication?

0 Answers   CCIE,


Identify the order of the 5 step encapsulation? 1. Create the segment 2. Convert the frame to bits 3. Create the packet 4. Create the frame 5. User creates the data A.) 1,2,4,2,5 B.) 2,1,3,4,5 C.) 5,1,3,4,2 D.) 5,3,4,1,2

1 Answers  


Identify the prompt displayed if in privileged exec mode? A.) Router(config)# B.) Router# C.) Router> D.) Router(priv)#

2 Answers  


What is the result of using a hierarchical addressing framework? A. increased availability of addresses B. decreased distance between routers C. increased router memory requirements D. no need to maintain routing information

1 Answers  


Explain how many types of router?

0 Answers  


Which OSI layer provides best effort end to end packet delivery? A.) Data-Link B.) Presentation C.) Network D.) Transport E.) Physical F.) Application

2 Answers  


What is the utility of ping?

0 Answers  


What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS

2 Answers  


There is an emergency fall-back 'skeleton' IOS stored in read only memory on all Cisco routers. What command would make the router load the IOS from Read Only Memory? A.) reload rom B.) boot system rom C.) load ios bootflash D.) load ios rom E.) bootsystem skeleton

3 Answers  


A company running RIP V1 protocol on their 2 seperate networks, each nw has 14 routers, if the two nw wants to be merged with each other total no of routers will be 28. but rip metric is hop count(15). What needs to be done if this setup needs to be work ?

2 Answers   Satyam,


Which ipsec rule is used for the olympia branch and what does it define? (Choose two)

0 Answers  


Categories