Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Communication
Q:
The _______ accepts the message submitted by an MUA and enforces the policies of the hosting domain and the requirements of Internet standards.
Q:
The components that work together to implement MPLS-TE are: information distribution, path calculation, path setup and ________.
Q:
A ________ is a private network that is configured within a public network in order to take advantage of the economies of scale and management facilities of large networks.
Q:
When computing paths for LSPs, ________ considers the topology of the network, the attributes of the individual links between LSRs, and the attributes of existing LSPs.
Q:
A routing algorithm that takes into account the traffic requirements of various flows and that takes into account the resources available along various hops and through various nodes is referred to as a ________ algorithm.
Q:
The MPLS architecture supports two routing options: hop-by-hop and ________.
Q:
A MPLS label is a 32-bit field consisting of the following elements: label value, S, TTL, and ________.
Q:
For each forwarding equivalence class a specific path through the network of LSRs is defined. This is called a ________ path.
Q:
The ability to define routes dynamically, plan resource commitments on the basis of known demand, and optimize network utilization is referred to as ________.
Q:
In the early 1990s the telecom industry made a substantial investment in ________ as the network backbone technology of the future.
Q:
A ________ emulates a point-to-point or point-to-multipoint link and provides a single service that is perceived by its user as an unshared link or circuit of the chosen service.
Q:
An ________ represents a group of packets that share the same transport requirements, receive the same treatment en route to the destination and follow the same path and receive the same QoS treatment at each hop.
Q:
MPLS is a set of ________ specifications for including routing and traffic engineering information in packets.
Q:
Prior to the routing and delivery of packets in a given FEC, a path through the network, known as a ________, must be defined and the QoS parameters along that path must be established.
Q:
A MPLS network or internet consists of a set of nodes, called ________ capable of switching and routing packets on the basis of which a label has been appended to each packet.
Q:
________ is a set of protocols, or protocol suite, designed to address a number of issues, including traffic engineering, QoS, virtual private networks, and IP/ATM integration.
Q:
________ are widely used by enterprises to create WANs that span large geographic areas, to provide site-to-site connections to branch offices, and to allow mobile users to dial up their company LANs.A) CEsB) LSPsC) VPNsD) VCs
Q:
_______ are constructed based on link level addresses.
A) CEs
B) L2VPNs
C) L3VPNs
D) CR-LDPs
Q:
________ messages are used to create, change, and delete label mappings for FECs.A) Session establishment and maintenanceB) DiscoveryC) AdvertisementD) Notification
Q:
Protocols that communicate which label goes with which FEC are
called ________.
A) label routing protocols
B) label stacking protocols
C) label switching protocols
D) label distribution protocols
Q:
The essence of MPLS functionality is that traffic is grouped into ________.
A) FECs
B) ECN
C) LIBs
D) LSPs
Q:
________ refers to the fact that traffic routing is determined by labels, and is exercised below normal IP routing and filtering.
A) Label routing
B) Differentiated Services
C) Traffic engineering
D) Tunnel
Q:
Each label switching router builds a table, called a ________, to specify how a packet must be treated and forwarded.
A) LIB
B) LSP
C) ECN
D) FEC
Q:
________ define a flow of packets between two endpoints or, in the case of multicast, between a source endpoint and a multicast group of destination endpoints.
A) Pseudowires
B) Labels
C) Tunnels
D) Backbones
Q:
With a ________ the traffic of a given enterprise or group passes transparently through an internet in a way that effectively segregates that traffic from other packets on the internet.
A) LDP
B) MPLS
C) LSP tunnel
D) VPN
Q:
The objective of ________ is to support link layer interfaces, such as ATM and Ethernet, for providing VPNs for an MPLS-enabled IP packet switched network.
A) l3vpn
B) PCE
C) l2vpn
D) pwe3
Q:
MPLS is used to ensure that all packets in a particular flow take the same route over a ________.
A) label stack
B) backbone
C) tunnel
D) switched path
Q:
________ focuses on the architecture and techniques for constraint-based path computation.
A) CCAMP
B) PCE
C) 12vpn
D) Pwe3
Q:
MPLS is intended to provide connection-oriented QoS with features similar to those found in ________.
A) Integrated Services
B) IETF
C) Differentiated Services
D) ISA
Q:
________ have as their fundamental purpose dynamically finding a route through an internet between any source and any destination.
A) Routing protocols
B) Tunnel protocols
C) Label protocols
D) Traffic protocols
Q:
A key component of an MPLS network is the use of ________ to optimize and manage the load.
A) session distribution
B) nodes
C) labeled routers
D) traffic engineering
Q:
Traffic designated as VPN traffic can only go from a VPN source to a destination in the same VPN.
Q:
Path calculation is a signaling protocol to reserve the resources for a traffic flow and to establish the LSP for a traffic flow.
Q:
Hop-by-hop routing does not readily support traffic engineering or policy routing.
Q:
Route selection refers to the selection of an LSP for a particular FEC.
Q:
One of the most powerful features of MPLS is label stacking.
Q:
MPLS is an enhancement that does not require an upgrade to IP routers to support its features.
Q:
Effective use of traffic engineering can substantially increase usable network capacity.
Q:
MPLS imposes a connectionless framework on an IP-based internet and thus provides the foundation for sophisticated and reliable QoS traffic contracts.
Q:
For services such as voice and video that require a network with high predictability, the DS and IS approaches, by themselves, may prove inadequate on a heavily loaded network.
Q:
Like IP, MPLS is connection oriented.
Q:
MPLS delivers the quality of service required to support real-time voice and video but does not deliver SLAs that guarantee bandwidth.
Q:
MPLS can be used in packet-switching networks.
Q:
One of the benefits of MPLS is that it does not need to retain the flexibility of an IP-based networking approach
Q:
A routing algorithm develops information that can be used in determining how to handle packets with different service needs.
Q:
Multiprotocol Label Switching is well suited to implementing virtual private networks.
Q:
A receiver joins a multicast group by sending an ________ join message to a neighboring router.
Q:
RSVP takes a ________, or connectionless, approach in which the reservation state is cached information in the routers that is installed and periodically refreshed by end systems.
Q:
A drawback to the ________ queuing discipline is that no special treatment is given to packets from flows that are of a higher priority or are more delay sensitive.
Q:
The ________ is designed to provide a simple, easy to implement, low overhead tool to support a range of network services that are differentiated on the basis of performance.
Q:
The ________ is the most demanding service provided by ISA.
Q:
Three categories of ISA services are: guaranteed, controlled load and ________.
Q:
The ________ determines the order in which queued packets are transmitted and the selection of packets for discard if necessary.
Q:
ISA makes use of the following functions to manage congestion and provide QoS transport: admission control, queuing discipline, discard policy and ________.
Q:
Real-time traffic is an example of ________ traffic.
Q:
A ________ is a contract between a network provider and a customer that defines specific aspects of the service that is to be provided.
Q:
The ________ provides a framework for the development of protocols such as RSVP to handle multimedia/multicast traffic and provides guidance to router vendors on the development of efficient techniques for handling a varied load.
Q:
________ traffic is the traditional type of traffic supported on TCP/IP-based internets and can adjust to changes in delay and throughput across an internet and still meet the needs of its applications.
Q:
________ traffic is the type of traffic for which internets were designed.
Q:
In the ________ strategy, the source system knows the location of each member of the multicast group so the source need only send packets to those networks that contain members of the group.
Q:
The act of sending a packet from a source to multiple destinations is referred to as ________.
Q:
A good example of the ________ style is for an audio teleconference with multiple sites.A) DSB) FSC) FFD) WF
Q:
A flowspec contains the following elements: service class, Rspec and ______.A) BspecB) TspecC) DspecD) Sspec
Q:
RFC 2205 defines ________ which supplies supporting functionality for ISA.A) RSVPB) ISAC) GSAD) WFQ
Q:
________ takes into account the amount of traffic through each queue and gives busier queues more capacity without completely shutting out less busy queues.A) RSVPB) WFQC) FIFOD) SFQ
Q:
With ________ queuing each incoming packet is placed in a queue for its flow and serviced in a round robin fashion, taking one packet from each nonempty queue in turn.A) FIFOB) WFQC) simple fairD) guaranteed
Q:
A key element of the ________ is that a high percentage of transmitted packets will be successfully delivered.A) routing serviceB) best effort serviceC) controlled load serviceD) guaranteed service
Q:
The ________ updates the traffic control database used by the packet scheduler to determine the service provided for packets of each flow.
A) admission control
B) management protocol
C) reservation protocol
D) routing protocol
Q:
Packets are labeled for service handling by means of the 6-bit DS field in the IPv4 header or the IPv6 header. The value of the DS field, referred to as the ________, is the label used to classify packets for differentiated services.
A) DS boundary node
B) classifier
C) marking
D) DS codepoint
Q:
A ________ delays packets as necessary so that the packet stream in a given class does not exceed the traffic rate specified in the profile for that class.
A) marker
B) meter
C) dropper
D) shaper
Q:
A ________ is a distinguishable stream of related IP packets that results from a single user activity and requires the same QoS.
A) transport connection
B) routing algorithm
C) flow
D) jitter
Q:
The DS specifications refer to the forwarding treatment provided at a router as ________. This must be available at all routers and typically is the only part of DS implemented in interior routers.
A) WFQ
B) QoS
C) PHB
D) EF
Q:
The magnitude of delay variation is called ________ and is a critical factor in real-time applications.
A) dropper
B) routing control
C) jitter
D) packet loss
Q:
The ________ is intended to provide QoS transport over IP-based internets.
A) AS
B) PHB
C) ISA
D) IRP
Q:
If the server does not know the location of the members of the multicast group, then one way to assure that the packet is received by all members of the group is to ________ a copy of each packet to each network in the configuration over the least cost route for each network.
A) unicast
B) broadcast
C) multicast
D) multiple multicast
Q:
Addresses that refer to a group of hosts on one or more networks are referred to as ________.
A) distributed addresses
B) broadcast addresses
C) unicast addresses
D) multicast addresses
Q:
A router is able to anticipate congestion and prevent applications from causing an overload.
Q:
A key task of an internet is to deliver data from a source to one or more destinations with the desired QoS.
Q:
Many traffic sources can be defined easily and accurately by a token bucket scheme.
Q:
Integrated services are provided on the basis of a 6-bit label in the IP header, which classifies traffic in terms of the type of service to be given by routers for that traffic.