A.Queuing introduces equal delays for packets of the same flow, resulting in jitter.
B.When congestion occurs, dropping affects most of the TCP sessions, which simultaneously back off and then restart again.
C.All buffers can temporarily be seized by aggressive flows, and normal TCP flows experience buffer starvation.
D.There is no differentiated drop mechanism. Higher priority traffic is dropped in the same way as best-effort traffic.
E.In TCP starvation, traffic exceeds the queue limit because of the bursty nature of packet networks. A router cannot handle multiple concurrent TCP sessions.
F.Global synchronization occurs because multiple TCP hosts reduce their transmission rates at random intervals in response to packet dropping
您可能感興趣的試卷
你可能感興趣的試題
A. If the classification policy is based upon the ToS byte, the qos pre-classify command is required because the ToS byte only appears in the inner IP header.
B. The ToS byte is copied to the outer header by default. Therefore, the qos pre-classify command is not necessary.
C. With GRE encapsulation, the qos pre-classify command is applied on the tunnel interface. This practice allows for different OoS configurations on each tunnel.
D. With GRE encapsulation, the qos pre-classify command is applied on the physical interface. This practice allows for different OoS configurations on each interface.
E. With IPsec encapsulation, the qos pre-classify command is applied on the physical interface. This practice allows for different OoS configurations on each interface.
A. In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.
B. In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP field
C. In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.
D. The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.
E. The 802.10 standard uses a three bitfield referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.
Refer to the exhibit. Which two statements accurately describe the pictured WPA wireless LAN controller configuration?()
A.WPA1 is disabled and WPA2 is enabled.
B.WPA1 is enabled and WPA2 is disabled.
C.WPA1 is enabled and WPA2 is enabled.
D.TKIP is the default parameter for WPA1 andWPA2.
E.AES is the default parameter for WPA1 and WPA2.
F.The default WPA1 and WPA2 parameters are enabled
A.It compresses the Layer 2 payload and marks the packet as a high priority to be transmitted first
B.It fragments larger packets and allows VoIP packets to be transmitted in between them.
C.It stops the transmission of large packets when priority packets arrive.
D.It sends high priority packets in between normal traffic packets.
A.Use WFQ, CBWFO, and LLO to prioritize delay-sensitive packets
B.Use WFO, CBWFO, and LLO to compress the payload.
C.Give TCP packets priority over UDP packets.
D.Use control plane policing for cRTP queuing.
E.Use stacker and predictor to compress the payload.
最新試題
What is an advantage of the IntServ QoS model?()
Which three user interfaces exist for the Cisco WLAN Controllers?()
What can be used to maintain the voice quality on a link by limiting the number of calls that can be active at any given time?()
Which two characteristics are common between traffic policing and traffic shaping?()
Which two QoS classification and marking statements are true? ()
Which option correctly identifies the four main menus of a Cisco Wireless Control System (WCS)? ()
In the design of a QoS solution, which two factors should be taken into consideration?()
For delay sensitive traffic, what are the three best ways that are used to prevent packet loss? ()
The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()
When deploying a Cisco Wireless Control System (WCS) with the 2700 series location appliance, to within what range is on-demand location of rogue APs possible?()