单选题How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()ATraffic is switched from the first node receiving the AIS indication.BTraffic is switched from the far side of the failure, allowing handshaking to occur.CUPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.DUPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.
单选题
How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()
A
Traffic is switched from the first node receiving the AIS indication.
B
Traffic is switched from the far side of the failure, allowing handshaking to occur.
C
UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.
D
UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.
参考解析
解析:
暂无解析
相关考题:
Which statement is correct regarding exception traffic processing?() A. Exception traffic is only handled by the PFEB. Exception traffic is rate-limited across the internal link to protect the REC. Exception traffic is not prioritized during times of congestionD. Exception traffic is forwarded based on forwarding table entries
UPSR protection switching is initiated by (), while BLSR is initiated by (). A. the K1 SONET byte; the K2 SONET byteB. the K2 SONET byte;the K1 SONET byteC. transmitter switching;receiver detectionD. Line Overhead bytes;Path Overhead bytesE. Path Overhead bytes;Line Overhead bytes
A customer has 2 DS1s to add between adjacent nodes in a UPSR ring. What type of circuit should you recommend?() A. VT circuitsB. STS circuitsC. VT tunnel circuitsD. 1:1 protection circuitsE. 1:N protection circuits
You are provisioning a DS-1 circuit on an ONS 15454 UPSR configuration and XC-10G card. How many total VT ports are used within the VT matrix at the source node?() A.0B.1C.2D.3E.4
What is the correct relative switching priority in a BLSR ring (higher to lower)?() A. signal fail, signal degrade, manual switchB. signal degrade, signal fail, manual switchC. protection lockout, manual switch, path AISD. forced switch, manual switch, signal degradeE. protection lockout, manual switch, forced switch
Why is an OC-3 2F-BLSR not feasible?() A. Switch times would exceed 50 ms for an OC-3 BLSR ring.B. An equal amount of working and protect bandwidth is required.C. DCC bandwidth is not large enough to handle K1/K2 processing.D. There is not enough bandwidth in an OC-3 ring to justify BLSR protection.
Click the Exhibit button. A customer has several interconnected core rings (see exhibit). They want to create several irtual rings?utilizing their OC-192 backbone (nodes 1,2,3,4). What should you recommend?()A. PPMN with BLSR ringsB. PPMN with UPSR ringsC. 1:N protection on all core circuitsD. multi-ring interconnect with BLSR rings
How will the above access lists affect traffic?() A.FTP traffic from 192.169.1.22 will be deniedB.No traffic, except for FTP traffic will be allowed to exit E0C.FTP traffic from 192.169.1.9 to any host will be deniedD.All traffic exiting E0 will be deniedE.All FTP traffic to network 192.169.1.9/29 will be denied
A customer has 2 DS1s to add between adjacent nodes in a UPSR ring. What type of circuit should you recommend?()A、VT circuitsB、STS circuitsC、VT tunnel circuitsD、1:1 protection circuitsE、1:N protection circuits
In the network, VLAN Trunking Protocol (VTP) is running with a domain name of R1. VLANs 1, 2,3, 4, 5, 10, 20 are active on the network. Suddenly the whole network goes down. No traffic isbeing passed on VLANs 2, 3, 4, 5, 10, 20. However, traffic passes on VLAN 1 and indicates allswitches are operational. Right before the network problem occurred; a switch named SW13 wastaken out of the lab and added to the network. What three configuration issues on SW13 could becausing the network outage?()A、SW13 has a higher VTP configuration revision than the current VTP revisionB、SW13 is configured as a VTP server with a different domain nameC、SW13 is configured as a VTP server with the domain name R1D、SW13 has a lower VTP configuration revision than the current VTP revisionE、SW13 is not configured to participate in VTPF、SW13 is configured with only VLAN1
What is the correct relative switching priority in a BLSR ring (higher to lower)?()A、signal fail, signal degrade, manual switchB、signal degrade, signal fail, manual switchC、protection lockout, manual switch, path AISD、forced switch, manual switch, signal degradeE、protection lockout, manual switch, forced switch
How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A、Traffic is switched from the first node receiving the AIS indication.B、Traffic is switched from the far side of the failure, allowing handshaking to occur.C、UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.D、UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.
UPSR protection switching is initiated by (), while BLSR is initiated by ().A、the K1 SONET byte; the K2 SONET byteB、the K2 SONET byte;the K1 SONET byteC、transmitter switching;receiver detectionD、Line Overhead bytes;Path Overhead bytesE、Path Overhead bytes;Line Overhead bytes
How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?()A、It sends the traffic through one egress port toward its destinationB、It sends the traffic through multiple egress ports to all available receiversC、It sends the traffic through an internal link to the RED、It sends the traffic to the local system for further processing
A subscriber makes a two-minute call and a four-minute call during the busy hour. How much traffic does he generate for that hour? ()A、33 millierlangsB、66 millierlangsC、100 millierlangsD、10 millierlangsE、25millierlangs
Which four services use the inner labels of an MPLS label stack? ()A、MPLS VPNB、switching path in MPLS coreC、Cisco MPLS Traffic Engineering and Fast RerouteD、MPLS over ATME、VPN over Traffic Engineering coreF、any transport over MPLS
How will the above access lists affect traffic?()A、FTP traffic from 192.169.1.22 will be deniedB、No traffic, except for FTP traffic will be allowed to exit E0C、FTP traffic from 192.169.1.9 to any host will be deniedD、All traffic exiting E0 will be deniedE、All FTP traffic to network 192.169.1.9/29 will be denied
单选题How is SNCP and MS-SPRing traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A SNCP traffic is switched from the first node that recieves the AIS. MS-SPRing traffic is rerouted from the first in the ring.B SNCP traffic is selected at the destination node in the ring. MS-SPRing is rerouted from the originating node in the ring.C SNCP traffic is rerouted from the originating node in the ring. MS-SPRing traffic is rerouted from the originating node in the ring.D SNCP traffic is selected at the destination node in the ring. MS-SPRing traffic is rerouted from the last reachable node in the ring.
单选题How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()ATraffic is switched from the first node receiving the AIS indication.BTraffic is switched from the far side of the failure, allowing handshaking to occur.CUPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.DUPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.
单选题A customer has 2 DS1s to add between adjacent nodes in a UPSR ring. What type of circuit should you recommend?()AVT circuitsBSTS circuitsCVT tunnel circuitsD1:1 protection circuitsE1:N protection circuits
单选题Why is an OC-3 2F-BLSR not feasible?()ASwitch times would exceed 50 ms for an OC-3 BLSR ring.BAn equal amount of working and protect bandwidth is required.CDCC bandwidth is not large enough to handle K1/K2 processing.DThere is not enough bandwidth in an OC-3 ring to justify BLSR protection.
单选题Which statement is correct regarding exception traffic processing?()AException traffic is only handled by the PFEBException traffic is rate-limited across the internal link to protect the RECException traffic is not prioritized during times of congestionDException traffic is forwarded based on forwarding table entries
单选题UPSR protection switching is initiated by (), while BLSR is initiated by ().Athe K1 SONET byte; the K2 SONET byteBthe K2 SONET byte;the K1 SONET byteCtransmitter switching;receiver detectionDLine Overhead bytes;Path Overhead bytesEPath Overhead bytes;Line Overhead bytes
单选题A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()AAll traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewableBClients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patternsCAll traffic is redirected to the VLAN that the attacker used to flood the CAM tableDAll traffic is flooded out all ports and an attacker is able to capture all dataENone of the other alternatives apply
单选题What protection method is used in 4F BLSR networks?()AEach fiber has half of its SONET capacity reserved for protection.BTwo fibers in the span carry working traffic, while the other two fibers in the span are reserved for protection.CThe signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.DThe signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.