单选题What protection method is used in 4F MS-SPRing networks?()A Each fiber has half of its capacity reserved for protection.B Two fibers carry their full capacities while the other two fibers are reserved for protection.C The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.D The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.

单选题
What protection method is used in 4F MS-SPRing networks?()
A

 Each fiber has half of its capacity reserved for protection.

B

 Two fibers carry their full capacities while the other two fibers are reserved for protection.

C

 The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.

D

 The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.


参考解析

解析: 暂无解析

相关考题:

Packet switching is a method of slicing(71) messages into parcels called "packets," sending the packets along different communication(72) as they become available, and then reassembling the packets(73) they arrive at their destination. Prior to the development of packet switching, early computer networks used leased, dedicated telephone circuits to(74) with terminals and other computers. In circuit-switched networks such as the telephone system, a complete point-to-point(75) is put together, and then communication can proceed.A.binaryB.usefulC.digitalD.analog

When ‘Final’ is used in class, method and property, what dose itmean?

What is used to segment larger networks into smaller networks?() A.supernet masksB.subnet masksC.wildcard masksD.route filtering

What are three advantages of VLANs?()A、VLANs establish broadcast domains in switched networks.B、VLANs utilize packet filtering to enhance network security.C、VLANs provide a method of conserving IP addresses in large networks.D、VLANs provide a low-latency internet working alternative to routed networks.E、VLANs allow access to network services based on department, not physical location.F、VLANs can greatly simplify adding, moving, or changing hosts on the network.

Which option describes the incorrect usage of the Label Distribution method?()A、LDP is primarily used in internal networks of MPLS-VPN providers.B、MP-BGP is used for label distribution for VPN customer routes.C、Directed LDP is used for label distribution in L2-VPN Attachement Circuits.D、MP-BGP is used for label distribution in MPLS Traffic Engineered networks.

What is true regarding Autonomous Systems (AS )?()A、AS numbers are assigned by the IANAB、AS numbers are used by BGP (Border Gateway protocol ) to exchange IP routing information with neighboring ASC、In the internet, an Autonomous System (AS) is a collection of IP networks and routers under the controlD、All of the Above

What is the purpose of a network mask?()A、It is used in conjunction with the wildcard mask to determine the number of hosts on a networkB、It is used to define which parts of the IP address are allocated to host addresses and network prefixesC、It is used to hide subnets from external networks by masking the subnets with NATD、It is used to differentiate a network as a classful network or a classless network

A cluster administrator has defined a custom error notification method that will email and  administrator when a temp error is detected on an individual hdisk. What method should be used to test this functionality?()  A、 sendmail -biB、 yes /dev/kmemC、 emulate errlog entryD、 reducevg vgname hdisk#

How do you define the authentication method that will be used with AAA?()A、With the method aaa commandB、With the method commandC、With a method listD、With a method statement

What is the correct relative switching priority in an MS-SPRing ring (higher to lower)? ()A、 signal fail, signal degrade, manual switchB、 signal degrade, signal fail, manual switchC、 protection lockout, manual switch, path AISD、 forced switch, manual switch, signal degradeE、 protection lockout, manual switch, forced switch

What are two major differences between MS-SPRing and SNCP?()A、 In an MS-SPRing, all paths are protected.B、 MS-SPRing is always a high-order protection.C、 A low order circuit cannot be protected by an MS-SPRing.D、 There is no theoretical limit in the number of nodes in an SNCP ring.

In a switched LAN network, what is the Spanning-Tree algorithm used for?()A、It is used to provide a mechanism for routing updates in switched environments.B、It is used to prevent routing loops in networks with redundant routes.C、It is used to prevent switching loops in networks with redundant switched routes.D、It is used to manage, the addition, deletion, and naming of VLANs across multiple switches.E、It is used to segment a network into multiple collision domains.F、None of the above.G、All of the above are functions of STP.

Why is an STM-1 2F-MS-SPRing NOT feasible?()A、 An equal amount of working and protect bandwidth is required.B、 DCC bandwidth is not large enough to handle K1/K2 processing.C、 Switch times would exceed 50 ms for an STM-1 MS-SPRing ring.D、 There is not enough bandwidth in an STM-1 ring to justify MS-SPRing protection.

What is the difference between 1+1 and 1:1 protection switching?()A、 1+1 is based on APS, while 1:1 is based on IPS.B、 1:1 is used in SNCP switching, while 1+1 is used in MS-SPRing switching.C、 1+1 sends signals on Working and Protect paths, while 1:1 sends signals only on Working path.D、 1+1 sends signals on Working path ONLY, while 1:1 sends signals on both Working and Protect paths.

What protection method is used in 4F MS-SPRing networks?()A、 Each fiber has half of its capacity reserved for protection.B、 Two fibers carry their full capacities while the other two fibers are reserved for protection.C、 The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.D、 The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.

单选题How is SNCP and MS-SPRing traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A SNCP traffic is switched from the first node that recieves the AIS.  MS-SPRing traffic is rerouted from the first in the ring.B SNCP traffic is selected at the destination node in the ring.  MS-SPRing is rerouted from the originating node in the ring.C SNCP traffic is rerouted from the originating node in the ring. MS-SPRing traffic is rerouted from the originating node in the ring.D SNCP traffic is selected at the destination node in the ring. MS-SPRing traffic is rerouted from the last reachable node in the ring.

单选题Which option describes the incorrect usage of the Label Distribution method?()ALDP is primarily used in internal networks of MPLS-VPN providers.BMP-BGP is used for label distribution for VPN customer routes.CDirected LDP is used for label distribution in L2-VPN Attachement Circuits.DMP-BGP is used for label distribution in MPLS Traffic Engineered networks.

单选题What is used to segment larger networks into smaller networks?()Asupernet masksBsubnet masksCwildcard masksDroute filtering

多选题What are two major differences between MS-SPRing and SNCP?()AIn an MS-SPRing, all paths are protected.BMS-SPRing is always a high-order protection.CA low order circuit cannot be protected by an MS-SPRing.DThere is no theoretical limit in the number of nodes in an SNCP ring.

单选题A cluster administrator has defined a custom error notification method that will email and  administrator when a temp error is detected on an individual hdisk. What method should be used to test this functionality?()A sendmail -biB yes /dev/kmemC emulate errlog entryD reducevg vgname hdisk#

单选题What is the difference between 1+1 and 1:1 protection switching?()A 1+1 is based on APS, while 1:1 is based on IPS.B 1:1 is used in SNCP switching, while 1+1 is used in MS-SPRing switching.C 1+1 sends signals on Working and Protect paths, while 1:1 sends signals only on Working path.D 1+1 sends signals on Working path ONLY, while 1:1 sends signals on both Working and Protect paths.

单选题Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()AGRE tunnelsBautomatic 6 to 4 tunnelsCISATAP tunnelsDmanual tunnels (RFC 2893)

单选题What teaching method is used by the teacher if much of his/her class time is spent on drilling sentence patterns followed by exercises like repetition, memorization, mimicry, etc?AThe Natural Approach.BThe Communicative Approach.CThe Audio-lingual Method.DThe Grammar-translation Method.

单选题What is the correct relative switching priority in an MS-SPRing ring (higher to lower)? ()A signal fail, signal degrade, manual switchB signal degrade, signal fail, manual switchC protection lockout, manual switch, path AISD forced switch, manual switch, signal degradeE protection lockout, manual switch, forced switch

单选题What protection method is used in 4F BLSR networks?()AEach fiber has half of its SONET capacity reserved for protection.BTwo fibers in the span carry working traffic, while the other two fibers in the span are reserved for protection.CThe signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.DThe signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.

多选题What are three advantages of VLANs?()AVLANs establish broadcast domains in switched networks.BVLANs utilize packet filtering to enhance network security.CVLANs provide a method of conserving IP addresses in large networks.DVLANs provide a low-latency internet working alternative to routed networks.EVLANs allow access to network services based on department, not physical location.FVLANs can greatly simplify adding, moving, or changing hosts on the network.

单选题What is the purpose of a network mask?()AIt is used in conjunction with the wildcard mask to determine the number of hosts on a networkBIt is used to define which parts of the IP address are allocated to host addresses and network prefixesCIt is used to hide subnets from external networks by masking the subnets with NATDIt is used to differentiate a network as a classful network or a classless network