Review Questions
Note: For multiple-choice questions, there may be more than one correct answer.
True or False: You should always apply QoS classification in the access layer and as close to the network device as possible.
True or False: Congestion management includes the RED, WRED, and tail-drop QoS features.
What is the purpose of trust boundaries?
To determine the classification of a packet as a specific location in the network.
To determine where in the network packets are dropped.
To determine where in the network to reclassify packets.
It is an administrative configuration where Layer 2 or Layer 3 priority designations of frames or packets are either accepted or not.
Which QoS mechanism, commonly found on low-speed interfaces, reduces delay and jitter on slower-speed links by breaking up large datagrams and interleaving low-delay traffic packets with the resulting smaller packets?
LFI
IP RTP Priority
queuing and scheduling
Which QoS model requires end-to-end configuration?
LFI
IntServ
DiffServ
Traffic conditioning
In designing a multilayer switched network, you are required to condition traffic on a Catalyst switch such that TCP flows do not achieve more than 10 Mbps out of a 100-Mbps interface. Which of the following methods of traffic conditioning achieves link utilization closest to 10 Mbps?
Shaping
Policing
Which of the following methods of traffic conditioning would you use to limit VoIP traffic?
Shaping
Policing
Figure 10-19 illustrates an IP Phone attached to a Catalyst 3550 switch. Consider a situation in which the IP Phone is sending voice packets to another IP Phone with a DSCP value of 46 and a CoS value of 5. If the Catalyst 3550 switch is configured to trust DSCP and is using the default mapping tables, what is the internal DSCP of the frame as it traverses the switch?
5
46
40
0
With regard to Figure 10-19, consider a situation in which the IP Phone is sending voice packets to another IP Phone with a DSCP value of 46 and a CoS value of 5. If the Catalyst 3550 switch is configured to trust CoS and the switch is using the default mapping tables, what is the internal DSCP of the frame as it traverses the switch?
5
46
40
0
With regard to Figure 10-19, consider a situation in which the IP Phone is sending voice packets to another IP Phone with a DSCP value of 46 and a CoS value of 5. If the Catalyst 3550 switch is configured to untrusted and the switch is using the default mapping tables, what is the internal DSCP of the frame as it traverses the switch?
5
46
40
0
With regard to Example 10-13, which configuration command is the class action of the policy map?
class LIMIT-TCP_File_Sharing
police 1536000 20000 exceed-action drop
match access-group 101
With regard to Example 10-13, which action is taken for packets that conform to the policing rate?
Transmit
Drop
Mark-down
Figure 10-19 QoS Topology for Questions 8-10
Example 10-13 is for use in questions 11 and 12.
Example 10-13 Sample Policing Configuration
(text deleted) ! class-map match-any LIMIT-TCP_File_Sharing match access-group 100 match access-group 101 ! ! policy-map LIMIT_File_Sharing class LIMIT-TCP_File_Sharing police 1536000 20000 exceed-action drop ! ! (text deleted) !