A.DPT/RPR uses a bi-directional ring consisting of two symmetric counter rotating fibre rings.
B.DPT/RPR is defined in the IEEE 802.17 standard and it uses Token Bucket system to avoid collisions on the fiber.
C.In DPT/RPR rings, data packets can be sent in one direction (downstream) and the corresponding control packets in the opposite direction (upstream),thus using both fibres concurrently to maximise bandwidth.
D.DPT/RPR can be deployed in the Core of the SP networks where point-to-point POS links are used tomake best use of the Bandwidth.
您可能感興趣的試卷
你可能感興趣的試題
A.The configuration to define Route-Distinguisher is Ip vrf bulle Rd 1:1
B.A route distinguisher can be imported and exported to and from a VRF
C.Route-Distinguisher is an 8 byte BGP attribute value used in influencing BGP best path algorithm.
D.Route-Distinguisher is an 8 byte value used in creating unique VPNv4 address.
A.Control Plane Policing (CoPP) addresses the need to protect the management planes, ensuring routingstability, availability, and critical packet delivery.
B.Control Plane Policing (CoPP) leverages MQC to define traffic classification criteria and to specifyconfigurable policy actions for the classified traffic.
C.Control Plane Policing (CoPP) uses a dedicated "control-plane" command via the Modular QoS CLI (MQC)to provide filtering and rate limiting capabilities.
D.Control Plane Policing (CoPP) uses "service policy" command under relevant interfaces to filter DOS packet to protect routing packets.
E.Control Plane Policing (CoPP) protects the transit management and data traffic through the router.
A.MPLS TE FR
B.MPLS VPN
C.BFD
D.RSVP
E.VPLS
F.SNMP
A.Lower power consumption
B.Lower maintenance cost
C.Simplified configuration
D.Deterministic performance
E.Longer uptime
A.AF Class
B.Drop Probability
C.CS(Class Selector Value )
D.PHB (Per-Hop Behavior )
E.IP Precedence
F.Queue Depth
最新試題
All secure domain routers (SDRs) have shared attribute and resources. Which three resources are sharedall SDRs? ()
What is the BGP synchronization rule?()
What layer of the TMN (telecommunications management network) model does CTM fit into?()
When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()
Which two routers support cable access?()
Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()
Cisco IOS XR Software Multicast Routing Implementation, which three features are supported in IPv6 onCisco CRS router?()
Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()
Which tree of these are types of Ethernet Virtue Connections (EVCs) in the MEF concept?()
Which three protocols use TLVs to carry attributes?()