What should be the next three steps in identifying the root cause?

Users have complained recently about their experience with a collaboration tool that is being used
on different international locations on your network. The collaboration tool uses IP precedence of
“4” for all the traffic that runs over your network. Upon investigating the problem, you noticed that
the tool worked fine most of the time. You observed that video frames would freeze occasionally
for a short time, and some collaboration features had slow responses. The IT department has
been engaged, and they believe that the problem is with the network transport. You tried end-toend extended pings by using the ToS value of 128 and noticed a high round-trip time on some of
the ping packets. To the best of your knowledge, all the routers in the forwarding path are
distributed architecture, hardware-based forwarding devices, and the entire path is QoS-enabled.
What should be the next three steps in identifying the root cause? (Choose three.)

Users have complained recently about their experience with a collaboration tool that is being used
on different international locations on your network. The collaboration tool uses IP precedence of
“4” for all the traffic that runs over your network. Upon investigating the problem, you noticed that
the tool worked fine most of the time. You observed that video frames would freeze occasionally
for a short time, and some collaboration features had slow responses. The IT department has
been engaged, and they believe that the problem is with the network transport. You tried end-toend extended pings by using the ToS value of 128 and noticed a high round-trip time on some of
the ping packets. To the best of your knowledge, all the routers in the forwarding path are
distributed architecture, hardware-based forwarding devices, and the entire path is QoS-enabled.
What should be the next three steps in identifying the root cause? (Choose three.)

A.
Check RP CPU utilization for all routers in the data path.

B.
Look for queue buildup on interfaces that are being traversed by this traffic.

C.
Perform application profiling and correct ToS usage by using sampled NetFlow.

D.
Verify that the ACLs are not misconfigured and causing a problem.

E.
Use MEMORY-POOL-MIB for verifying free memory.

F.
Deploy IP SLAs as a proactive measure to correlate IP delay variations to certain times of the
day.



Leave a Reply 0

Your email address will not be published. Required fields are marked *