A.end-to-end network delay times that exceed 50 ms for real-time traffic are considered unacceptable
B.end-to-end network delay times that exceed 250 ms for real-time traffic are considered unacceptable
C.end-to-end network delay is not a factor as long as the delay is consistent
D.some packet loss can be corrected by codec algorithms
E.RSVP handles voice packet retransmission
F.fragmentation is a result of packet loss
您可能感興趣的試卷
你可能感興趣的試題
A.analog trunks that provide the Survivable Remote Site Telephony (SRST) feature
B.analog trunks that provide VoIP gateway functionality
C.analog trunks that connect a gateway to plain old telephone service (POTS) device such as analog phones, fax machines, and legacy voice-mail systems
D.analog trunks that connect a gateway to a central office (CO) or private branch exchange (PBX)
A.sampling
B.packetization
C.quantization
D.serialization
A.The router that is directly connected to the IP phone will look up the called number in its call routing table.
B.The router that is directly connected to the IP phone will inform its call agent when a service request is detected.
C.When the IP phone is picked up,the IP phone initiates the service request.
D.The directly connected router passes the collected digits to its call agent,and the call agent looks up in its call-routing table the called number.
A.propagation delay
B.voice packet serialization delay
C.congested egress queues
D.header overhead
E.packets dropped because of CRC errors
A.Calls to the PSTN can be made via the use of FXO or T1/E1 trunk ports.
B.Calls to the PSTN can be made via FXS or T1/E1 trunk ports.
C.Analog and IP phones can be connected to the VoIP network via FXO or T1/E1 trunk ports.
D.Calls between analog phones that are attached to the FXS ports in a VoIP network can be completely processed by voice-enabled routers.
最新試題
In a VoIP network, which type of interface would an analog fax machine connect to?()
For delay sensitive traffic, what are the three best ways that are used to prevent packet loss? ()
When QoS levels in the Cisco Wireless Control System (WCS) are entered, which profile names are used to identify the access categories?()
Which three user interfaces exist for the Cisco WLAN Controllers?()
Which two characteristics are common between traffic policing and traffic shaping?()
Within the WMM policy, how many default QoS radio access categories are there?()
Which three practices are important to the implementation of a DiffServ QoS architecture?()
Which two VoIP capabilities are utilized when the CallManager and the gateway are configured for Survivable Remote Site Telephony?()
Which two QoS classification and marking statements are true? ()
What can be used to maintain the voice quality on a link by limiting the number of calls that can be active at any given time?()