What device has content-addressable memory (CAM) and what is
stored in it?
1 A: Switch, learned IP addresses
2 B: Router, learned IP addresses
3 C: Switch, learned MAC addresses
4 D: Router, learned MAC addresses
Answers were Sorted based on User's Feedback
Answer / rohit sunkara
CAM is used to store learned MAC addresses.N since MAC-add
involves usage of a switch,the answer is
Switch,learned MAC addresses
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / pachicoo
Content-addressable memory is often used in computer
networking devices. For example, when a network switch
receives a data frame from one of its ports, it updates an
internal table with the frame's source MAC address and the
port it was received on. It then looks up the destination
MAC address in the table to determine what port the frame
needs to be forwarded to, and sends it out on that port.
The MAC address table is usually implemented with a "binary
CAM" so the destination port can be found very quickly,
reducing the switch's latency.
Ternary CAMs are often used in network routers, where each
address has two parts: the network address, which can vary
in size depending on the subnet configuration, and the host
address, which occupies the remaining bits. Each subnet has
a network mask that specifies which bits of the address are
the network address and which bits are the host address.
Routing is done by consulting a routing table maintained by
the router which contains each known destination network
address, the associated network mask, and the information
needed to route packets to that destination. Without CAM,
the router compares the destination address of the packet
to be routed with each entry in the routing table,
performing a logical AND with the network mask and
comparing it with the network address. If they are equal,
the corresponding routing information is used to forward
the packet. Using a "ternary CAM" for the routing table
makes the lookup process very efficient. The addresses are
stored using "don't care" for the host part of the address,
so looking up the destination address in the CAM
immediately retrieves the correct routing entry; both the
masking and comparison are done by the CAM hardware.
| Is This Answer Correct ? | 0 Yes | 0 No |
Which reserve port number talent use?
What are the two primary operating modes for frame switching? A. Full Duplex B. Half-Duplex C. CSMA/CD D. Cut-through E. Fragmentation F. Store and Forward G. User mode H. Privileged mode
Explain the types of nat?
Which OSI layer establishes, maintains and terminates sessions between hosts? A.) Application B.) Physical C.) Data-Link D.) Presentation E.) Network F.) Session
Which of the following is an example of a Transport Layer protocol? Ethernet IP TCP RS-232
Which can be logged by IPX extended access lists? A.) source address B.) protocol C.) source socket D.) access list number E.) destination socket F.) destination address
frends i am suffring from newfolder.exe virus in my server 2000 win how i have to remove it plz help me Jitendera sinha
srry for inconvnce ..here is complete qs...ignore the previous 1 3 router configured with RIP & Ripv2 rotuer 1- connected with router 2 having sr ip 10.0.1.2 routing : ripv2 E0:192.168.1.10 router 2: connected with router 1 and router 3 having sr 0 ip 10.0.1.3 & sr 1 ip 11.0.1.2 routing :rip & ripv2 E0=192.168.10.2 router 3: connected with router 2 having sr ip 11.0.1.3 routing: rip E0=172.16.10.2 is there communication possible?
Of the following, which reason applies to dividing a large network into two or more smaller networks? Performance Security Address Management All of the above
You have a Class B network address divided into 30 subnets. You will add 25 new subnets within the next year. You need 600 host IDs for each subnet. Which subnet mask should you use? A.) 255.254.0.0 B.) 255.192.0.0 C.) 255.255.252.0 D.) 255.255.248 0
How to crimping cat cable without using crimping and any tool...........?
What is the function of the Transport layer and which protocols reside there? A.) MAC addressing - IP B.) Interhost communication - SQL, NFS C.) Best effort Packet delivery - TCP, UDP D.) End-to-end connections - TCP, UDP