單項選擇題Which statement is FALSE concerning Concatenation?()

A.It allows ITCM to send multiple upstream packets in one single large burst.
B.It reduces upstream data throughput.
C.It can be enabled/disabled from CMTS on per upstream port basis if desired
D.Concatenation activity on an interface can be checked by the show controller counters command


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題In optical transmission systems, chirped lasers are used for the purpose of:().

A.Turning the laser to a specific ITU channel
B.Keeping the signal wavelength "locked" to a specific technology
C.Suppressing FWM and SBS non-linear effects
D.None ofthe above

2.單項選擇題What layer of the TMN (telecommunications management network) model does CTM fit into?()

A.Network management layer
B.Element management layer
C.Business management layer
D.Network element layer

5.單項選擇題What is the statistical reserve?()

A.Bandwidth that is reserved for SVCs to route over a trunk
B.Bandwidth that is reserved on a trunk so that ABR connections can burst
C.Bandwidth on a trunk that is reserved for control traffic and cannot be used by connections
D.Bandwidth that cannot be allocated to connections but can be used to accommodate statistical variations in the traffic

最新試題

Which three things are the building blocks of the Cisco VPLS architecture?()

題型:多項選擇題

Assume that the PEs are separated by Multiple P routers.How many labels should the ingress PE push for BPE functionality?()

題型:單項選擇題

Which statement about implementing the Cisco IPv6 provider Edge Router over MPLS is true?()

題型:單項選擇題

In optical transmission systems, chirped lasers are used for the purpose of:().

題型:單項選擇題

MPLS label mapping on an LSR is displayed by which IOS command?()

題型:單項選擇題

Which statement is FALSE concerning Concatenation?()

題型:單項選擇題

Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()

題型:單項選擇題

Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()

題型:單項選擇題

What layer of the TMN (telecommunications management network) model does CTM fit into?()

題型:單項選擇題

In the Carrier Supporting Carrier (CsC) feature, which two protocols run between CSC-PE and CSC-CE().

題型:多項選擇題