A.FEC might correspond to a destination IP subnet, but it might also correspond to any traffic class that the edge LSR considers significant.
B.FEC is a group of IP packets that is forwarded over a different path, but with the same forwarding treatment.
C.FEC is a group of IP packets that is forwarded over the same path, and with the same forwarding treatment.
D.FEC is a group of IP packets that is forwarded over a different path, but with the different forwarding treatment.
E.FEC is a group of IP packets that is forwarded over the same path, but with a different forwarding treatment
您可能感興趣的試卷
你可能感興趣的試題
A.the number of subscribers that will be serviced currently and in the future because this affects the number of required PPPoA sessions
B.The types of applications that the NSP offers to the end subscriber
C.The capacity of ATM and Frame Relay interworking on the NSP
D.in the case of more than one user, whether all users need to reach the same final destination orservice,or they all have different service destinations
E.Whether the service provider or the final service destination is providing the IP address to the CPE of the subscriber
A.after the Layer 3 header and before the Layer 2 payload
B.after the Layer 3 header and before the Layer 4 payload
C.after the Layer 2 header and before the Layer 1 payload
D.after the Layer 1 header and before the Layer 2 payload
E.after the Layer 2 header and before the Layer 3 payload
A.EBGP sessions between confederation sub ASs do not modify the next-hop attribute.
B.By default, iBGP sessions change the next-hop attribute learned from eBGP peers to self address.
C.By default, the next-hop attribute is not changed when a prefix is reflected by the route reflector
D.EBGP sessions between confederation sub ASs change the next-hop attribute to peer address.
E.By default, iBGP sessions preserve the next-hop attribute learned from eBGP peers.
A.IP protocol 50
B.TCP port 51
C.UDP port 50
D.IP protocol 51
E.UDP port 51
F.TCP port 50
A.the protocol used to determine the authentication method
B.the protocol used to identify the data in the Information field
C.the protocol used to carry the PPP frame
D.the protocol used to decode the FCS field
E.the protocol used to detect the number of padding bytes
最新試題
Which statement is FALSE concerning Concatenation?()
Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()
What layer of the TMN (telecommunications management network) model does CTM fit into?()
When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()
Which three statements about MPLS traffic engineering (MPLS TE) are true? ()
Which statement about implementing the Cisco IPv6 provider Edge Router over MPLS is true?()
Which of the following is used to periodically multicast by DIS on a LAN to ensure IS-IS link state databaseaccuracy?()
Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()
There are two cabling schemes to choose from when implementing a Cisco CRS-1 multishelf system:single-module cabling and multimodule cabling. What is the maximum capacity of the LCCs that aresupported in multimodule cabling?()
Which tree of these are types of Ethernet Virtue Connections (EVCs) in the MEF concept?()