A.It requires a next-next hop backup tunnel.
B.Point of local repair (PLR) swaps the next hop label and pushes the backup label.
C.The backup tunnel terminates on the merge point (MP) where traffic rejoins the primary tunnel.
D.The backup tunnel can have associated bandwidth capacity.
E.Restoration time is expected under 50 ms.
您可能感興趣的試卷
你可能感興趣的試題
A.head-end router
B.branch-point router
C.midpoint router
D.leaf-point router
E.tail-end router
A.Clusters are used in confederation schemes to avoid loops.
B.BGP network can have a confederation within a route reflector area.
C.An internal BGP network cannot have a route reflector within a confederation.
D.An internal BGP network can have a route reflector within a confederation.
E.Clusters are used in route reflector schemes to avoid loops.
F.BGP network cannot have a confederation within a route reflector area.
A.It supports fast synchronization at starting and before network failures
B.It supports automatic server discovery
C.It uses a fixed-point arithmetion
D.It supports the "nanokernel" kernel implementation
E.It does not support Public-Key Cryptography
A.backing up the information for the broken connections
B.provides common information for connecting processes and services
C.detection of a failed connection
D.provides an abstract name for a process or service
E.distribution of symbolic link information
A.RP
B.multicast source
C.IGMP router
D.multicast receiver
E.PIM designated router
最新試題
All secure domain routers (SDRs) have shared attribute and resources. Which three resources are sharedall SDRs? ()
Which configuration prevents traffic that is sourced from the unique local address scope to be sent out ofthe link to the upstream service provider?()
Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()
Which three protocols use TLVs to carry attributes?()
What method of streaming live video is the least taxing on bandwidth in a large enterprise environment?()
How many messages does internet Key Exchange use to negotiate SA characteristics when running inmain mode?()
Which three are advantages of SONET?()
In the Carrier Supporting Carrier (CsC) feature, which two protocols run between CSC-PE and CSC-CE().
Which of the following is used to periodically multicast by DIS on a LAN to ensure IS-IS link state databaseaccuracy?()
Which statement is FALSE concerning Concatenation?()