• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/34

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

34 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
What are the basic components of a VoIP network?
IP phones, gatekeepers, gateways, Multipoint Control Units, call agents, application servers, and videoconference stations
These are basic components that you see in most VoIP deployments.
Which of the VoIP components provides Call Admission Control (CAC), bandwidth control, and management and address translation?
Gatekeeper
A gatekeeper is typically used on VoIP networks that are medium to large in size. This is because many of the gatekeeper functions can be done on a normal router (acting as a voice gateway) with the correct software. A dedicated gatekeeper should be used in larger deployments, as additional knowledge of the whole network is required.
Which of the VoIP components provides translation between VoIP and non-VoIP networks?
Gateways
Gateways are needed on almost all VoIP network deployments because some part of the network requires connection to a non-VoIP device. A typical location for a gateway would be between the VoIP network and a PBX or between the VoIP network and the PSTN.
Which of the VoIP components provides real-time connectivity for participants in multiple locations to attend the same videoconference?
Multipoint Control Unit (MCU)
The MCU is a central component that is required if conferencing is required on the network.
Which of the VoIP components provides call control for IP phones, CAC, bandwidth control, and management, and address resolution in MGCP VoIP networks?
Call agent
In MGCP VoIP networks, the call agent is a central device that is used to perform call control, CAC, bandwidth control, and management and address resolution. A call agent is very similar to a gatekeeper in other VoIP protocols (H.323).
Which transport layer protocol is typically used for voice packets?
UDP
Because voice is very sensitive to delay and jitter, it is unimportant for it to utilize the connection-oriented behavior of TCP; a missed packet will not have time to be resent. Typically, it is acceptable for some small amount of loss on a VoIP call.
What is the maximum recommended one-way delay for a good quality VoIP call?
150 ms
It is recommended that the one-way delay for a VoIP call stay below 150 ms. A call will, of course, work if the delay is over this limit, but the quality could be impaired.
What is the recommended maximum packet loss on a VoIP call?
1%
It is recommended that the voice packet loss stay below 1% in order to retain a high-quality call.
What is the typical traffic profile of a VoIP call?
Steady low-bandwidth traffic
Typically, a VoIP call requires a small amount of bandwidth (per call) but requires this bandwidth to stay consistent over the length of the call.
What is the typical traffic profile for a video call?
Bursty high-bandwidth traffic
A video call is different from a VoIP call in that it does not typically require a steady amount of bandwidth. This is because the video codecs typically work by only relaying the difference in the video frames and not every frame. This means that the more movement in a video call, the more bandwidth it requires.
What feature is used to control the bandwidth, delay, jitter, and packet loss requirements of a VoIP or video call?
Quality of Service (QoS)
Quality of Service is used in order to ensure that the higher-priority traffic is ensured priority assess through the network, to reduce delay, jitter, and packet loss.
What feature allows a voice network to overlay a data network?
Auxiliary VLAN (voice VLAN)
The auxiliary VLAN feature allows a separate voice VLAN to be used from the data VLAN.
What protocol is used to assign a voice VLAN to a Cisco IP phone?
Cisco Discovery Protocol (CDP)
CDP is used to assign the voice VLAN to each Cisco IP phone.
Which Cisco IOS command is used to configure the voice VLAN of a switchport?
switch(config-if)#switchport voice vlan vlan-id
This command sets the voice VLAN that is assigned to a specific switchport.
Which Cisco IOS command is used to trust all incoming CoS values coming in a specific switchport?
switch(config-if)#mls qos trust cos
This command is used to automatically trust the CoS values that have been assigned to the incoming frames.
Which Cisco IOS command is used to trust all incoming CoS values coming in a specific switchport, but only if an IP phone is connected?
switch(config-if)#mls qos trust device cisco-phone
This command uses CDP to identify an IP phone on the switchport. If a phone is detected, the port uses QoS values based on the previously configured mls qos trust cos|ip-precedence|dscp command. If a phone is not detected, only default settings will be used.
Which Cisco IOS command is used to display configured voice parameters on an interface?
switch#show interfaces interface-id switchport
This command displays the configured voice parameters on an interface including the voice VLAN.
Which Cisco IOS command is used to display the configured QoS parameters on an interface?
switch#show mls qos interface interface-id
This command displays the configured QoS parameters on a specific interface (or switchport).
What is the recommended oversubscription ratio to be used on access-to-distribution links?
20 to 1
It is recommended that the links from the Access layer to the Distribution layer be oversubscribed at 20 to 1. In situations where this oversubscription is implemented, QoS may be required to give higher priority to delay-sensitive and critical traffic.
What is the recommended oversubscription ratio to be used on distribution-to-core links?
4 to 1
It is recommended that the links from the Distribution layer to the Core layer be oversubscribed at 4 to 1. In situations where this oversubscription is implemented, QoS may be required to give higher priority to delay-sensitive and critical traffic.
What is the field in the 802.1Q header that is used to mark QoS?
Priority (PRI) field, 802.1p field, or CoS field
The Priority (PRI) field is a 3-bit field that is part of the tag provided by 802.1Q. It was defined in the 802.1p standard as an extension of 802.1q. It is also known as the class of service (CoS) field.
What are the available values that can be used in the CoS field?
0 through 7
The class of service (CoS) field is a 3-bit field that is able to hold values from 0 through 7. The lower values represent lower priority.
What is the field in the IP header that is used to mark priority?
Type of Service (ToS)
The ToS field is included in the IP header to mark the priority of the IP traffic.
What are the two different ways the ToS field in the IP header can be used?
IP Precedence and Diffserv CodePoint (DSCP)
There are two main techniques for using the ToS field. In the original standard, IP precedence (3 bits) was defined. Since then, an additional standard, DSCP, has been put forward that uses the same field but in a different way, as defined by RFC 2474. DSCP values are 6 bits.
Of the eight bits available in the ToS byte, which are used to specify the DSCP value?
The six most-significant bits
The first six bits of the ToS field are used to specify the DSCP value.
Of the eight bits available in the ToS byte, which are used to specify flow control?
The two least-significant bits
The last two bits of the ToS field are used to specify flow control.
Which of the six DSCP bits are used for class selection?
The three most-significant bits
These three bits are used to correlate to CoS or IP precedence field values.
Which of the six DSCP bits are used for drop precedence?
The three least-significant bits
These three bits are used to signify the drop precedence of the traffic.
What is the purpose of a classification trust boundary?
A trust boundary is used to specify the interfaces on which incoming classification markings are to be trusted.
Trust boundaries are used in networks so that every device does not have to perform traffic classification. When trust boundaries are established, QoS automatically trusts the markings of the traffic incoming on the trusted interfaces.
What are the two common methods of providing power over Ethernet?
Cisco inline power and IEEE 802.3af
Cisco inline power was introduced before the standard was finalized, but is still used in many networks. The IEEE 802.3af standard is supported on both Cisco equipment and other vendor’s equipment.
What is the maximum amount of power that is supported over Cisco inline power and 802.3af?
15.4 watts
Both Cisco inline power and 802.3af provide up to 15.4 watts per port.
What is the maximum amount of power that is proposed in the 802.3at draft?
30 watts
Because some of the newer equipment requires a higher amount of power than is currently supplied in the 802.3af standard, the 802.3at standard increases the maximum amount of power.
Which Cisco IOS command is used to enable PoE on a switchport and automatically adjust the power supplied based on the discovery request?
switch(config-if)#power inline auto
This command is used to enable PoE on a specific switchport.
Which Cisco IOS command is used to display the PoE configuration?
switch#show inline power
This command displays the current PoE configuration on the device.