A.FEC might correspond to a destination IP subnet, but it might also correspond to any traffic class that the edge LSR considers significant.
B.FEC is a group of IP packets that is forwarded over a different path, but with the same forwarding treatment.
C.FEC is a group of IP packets that is forwarded over the same path, and with the same forwarding treatment.
D.FEC is a group of IP packets that is forwarded over a different path, but with the different forwarding treatment.
E.FEC is a group of IP packets that is forwarded over the same path, but with a different forwarding treatment
您可能感興趣的試卷
你可能感興趣的試題
A.the number of subscribers that will be serviced currently and in the future because this affects the number of required PPPoA sessions
B.The types of applications that the NSP offers to the end subscriber
C.The capacity of ATM and Frame Relay interworking on the NSP
D.in the case of more than one user, whether all users need to reach the same final destination orservice,or they all have different service destinations
E.Whether the service provider or the final service destination is providing the IP address to the CPE of the subscriber
A.after the Layer 3 header and before the Layer 2 payload
B.after the Layer 3 header and before the Layer 4 payload
C.after the Layer 2 header and before the Layer 1 payload
D.after the Layer 1 header and before the Layer 2 payload
E.after the Layer 2 header and before the Layer 3 payload
A.EBGP sessions between confederation sub ASs do not modify the next-hop attribute.
B.By default, iBGP sessions change the next-hop attribute learned from eBGP peers to self address.
C.By default, the next-hop attribute is not changed when a prefix is reflected by the route reflector
D.EBGP sessions between confederation sub ASs change the next-hop attribute to peer address.
E.By default, iBGP sessions preserve the next-hop attribute learned from eBGP peers.
A.IP protocol 50
B.TCP port 51
C.UDP port 50
D.IP protocol 51
E.UDP port 51
F.TCP port 50
A.the protocol used to determine the authentication method
B.the protocol used to identify the data in the Information field
C.the protocol used to carry the PPP frame
D.the protocol used to decode the FCS field
E.the protocol used to detect the number of padding bytes
最新試題
In optical transmission systems, chirped lasers are used for the purpose of:().
Which three protocols use TLVs to carry attributes?()
Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()
Which three things are the building blocks of the Cisco VPLS architecture?()
Which statement is FALSE concerning Concatenation?()
What is the BGP synchronization rule?()
What layer of the TMN (telecommunications management network) model does CTM fit into?()
Which of the following is used to periodically multicast by DIS on a LAN to ensure IS-IS link state databaseaccuracy?()
Which option is not a valid method to assign the lowest-order 64-bit field of an IPv6 unicast address?()
Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()