A.trunk admission control
B.forwarding traffic to tunnel
C.information distribution
D.path selection, calculation, and setup
E.traffic patterns prediction
您可能感興趣的試卷
你可能感興趣的試題
A.MPLS is required between the PE and CE routers that connect the backbone carrier to the customer carrier.
B.The backbone carrier must enable the PE router to check that the packets it receives from the CErouter contain only the labels that the PE router advertised to the CE router.
C.Every packet that crosses the backbone carrier must be encapsulated so that the packet includes MPLS labels
D.AII PE routers that link the backbone carrier to the customer carrier must run Route Target Rewrite.
E.Arouting protocol is required between the PE and CE routers that connect the backbone carrierto thecustomer carrier. The routing protocol enables the customer carrier to exchange IGP routing information with the backbone carrier.
A.immediately after receiving the first packet on the shared tree for a given (S,G)
B.after receiving over 1 kb/s traffic onthe shared tree for a given (S,G)
C.10 seconds after receiving the first packet on the shared tree for a given (S,G)
D.30 seconds after receiving the first packet on the shared tree for a given (S,G)
E.after receiving over 10 kb/s traffic onthe shared tree for a given (S,G)
A.MAC over MPLS
B.L2TPV3
C.802.1 QinQ
D.Ethernet over MPLS
E.GRE
A.Updating the pseudonode LSP
B.maintaining pseudonode link-state information
C.creating the pseudonode
D.flooding LSPs over the LAN
E.election of the pseudonode
A.routing primary language
B.routing policy language
C.routing police language
D.routing program language
E.routing protocol language
最新試題
Which three protocols use TLVs to carry attributes?()
Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? ()
Which three statements about MPLS traffic engineering (MPLS TE) are true? ()
Which of the following is used to periodically multicast by DIS on a LAN to ensure IS-IS link state databaseaccuracy?()
In optical transmission systems, chirped lasers are used for the purpose of:().
What method of streaming live video is the least taxing on bandwidth in a large enterprise environment?()
How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()
Which statement about the use of Route Target Rewrite is true?()
Which option is not a valid method to assign the lowest-order 64-bit field of an IPv6 unicast address?()
Which three things are the building blocks of the Cisco VPLS architecture?()