How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A、Traffic is switched from the first node receiving the AIS indication.B、Traffic is switched from the far side of the failure, allowing handshaking to occur.C、UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.D、UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.

How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()

  • A、Traffic is switched from the first node receiving the AIS indication.
  • B、Traffic is switched from the far side of the failure, allowing handshaking to occur.
  • C、UPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.
  • D、UPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.

相关考题:

He was in a traffic jam, ( ) made him late for school.A、thatB、whichC、whatD、how

How many traffic classes are supported on the ERX Edge Router?() A.1B.2C.4D.8

How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?() A. It sends the traffic through one egress port toward its destinationB. It sends the traffic through multiple egress ports to all available receiversC. It sends the traffic through an internal link to the RED. It sends the traffic to the local system for further processing

What are the contents of a scheduler?() A.A scheduler contains parameters that describe how a queue should be serviced.B.A scheduler contains traffic that is ready to be transmitted.C.A scheduler contains forwarding classes that allow traffic to be forwarded.D.A scheduler contains a map between the classification of a packet and its forwarding class.

UPSR protection switching is initiated by (), while BLSR is initiated by (). A. the K1 SONET byte; the K2 SONET byteB. the K2 SONET byte;the K1 SONET byteC. transmitter switching;receiver detectionD. Line Overhead bytes;Path Overhead bytesE. Path Overhead bytes;Line Overhead bytes

You are provisioning a DS-1 circuit on an ONS 15454 UPSR configuration and XC-10G card. How many total VT ports are used within the VT matrix at the source node?() A.0B.1C.2D.3E.4

Why is an OC-3 2F-BLSR not feasible?() A. Switch times would exceed 50 ms for an OC-3 BLSR ring.B. An equal amount of working and protect bandwidth is required.C. DCC bandwidth is not large enough to handle K1/K2 processing.D. There is not enough bandwidth in an OC-3 ring to justify BLSR protection.

Click the Exhibit button. A customer has several interconnected core rings (see exhibit). They want to create several irtual rings?utilizing their OC-192 backbone (nodes 1,2,3,4). What should you recommend?()A. PPMN with BLSR ringsB. PPMN with UPSR ringsC. 1:N protection on all core circuitsD. multi-ring interconnect with BLSR rings

The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN:How will the above access lists affect traffic?() A. FTP traffic from 192.169.1.22 will be denied.B. No traffic, except for FTP traffic will be allowed to exit E0.C. FTP traffic from 192.169.1.9 to any host will be denied.D. All traffic exiting E0 will be denied.E. All FTP traffic to network 192.169.1.9/29 will be denied.

How will the above access lists affect traffic?() A.FTP traffic from 192.169.1.22 will be deniedB.No traffic, except for FTP traffic will be allowed to exit E0C.FTP traffic from 192.169.1.9 to any host will be deniedD.All traffic exiting E0 will be deniedE.All FTP traffic to network 192.169.1.9/29 will be denied

36. We ___________ keep the new traffic law and learn how to protect ourselves.A.may.B.shouldC.canD.need

UPSR protection switching is initiated by (), while BLSR is initiated by ().A、the K1 SONET byte; the K2 SONET byteB、the K2 SONET byte;the K1 SONET byteC、transmitter switching;receiver detectionD、Line Overhead bytes;Path Overhead bytesE、Path Overhead bytes;Line Overhead bytes

How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?()A、It sends the traffic through one egress port toward its destinationB、It sends the traffic through multiple egress ports to all available receiversC、It sends the traffic through an internal link to the RED、It sends the traffic to the local system for further processing

A particular cell is expected to support 6 Erlangs of traffic at 1% Grade of Service. How many traffic channels are required?()A、6B、13C、3D、15E、22

How will the above access lists affect traffic?()A、FTP traffic from 192.169.1.22 will be deniedB、No traffic, except for FTP traffic will be allowed to exit E0C、FTP traffic from 192.169.1.9 to any host will be deniedD、All traffic exiting E0 will be deniedE、All FTP traffic to network 192.169.1.9/29 will be denied

You are provisioning a DS-1 circuit on an ONS 15454 UPSR configuration and XC-10G card. How many total VT ports are used within the VT matrix at the source node?()A、0B、1C、2D、3E、4

How does a controller-based access point configured to operate in sniffer mode behave?()A、allows client traffic, captures data on all channelsB、allows client traffic, captures data on a single channelC、allows no client traffic, captures data on all channelsD、allows no client traffic, captures data on a single channel

How can Cisco NetFlow be used to aid in the operation and troubleshooting of QoS issues? ()A、NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.B、NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.C、NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.D、NetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.

A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()A、Remark the traffic on ingress and prioritize on egress.B、Enable CEF and Netflow. C、Configure the MS-Windows QoS Scheduler to prioritize this traffic.D、Enable WRED.

How many traffic classes are supported on the ERX Edge Router?()A、1B、2C、4D、8

What are the contents of a scheduler?()A、A scheduler contains parameters that describe how a queue should be serviced.B、A scheduler contains traffic that is ready to be transmitted.C、A scheduler contains forwarding classes that allow traffic to be forwarded.D、A scheduler contains a map between the classification of a packet and its forwarding class.

单选题How many traffic classes are supported on the ERX Edge Router?()A1B2C4D8

单选题How is SNCP and MS-SPRing traffic rerouted during a protection switch when a complete fiber cable cut occurs?()A SNCP traffic is switched from the first node that recieves the AIS.  MS-SPRing traffic is rerouted from the first in the ring.B SNCP traffic is selected at the destination node in the ring.  MS-SPRing is rerouted from the originating node in the ring.C SNCP traffic is rerouted from the originating node in the ring. MS-SPRing traffic is rerouted from the originating node in the ring.D SNCP traffic is selected at the destination node in the ring. MS-SPRing traffic is rerouted from the last reachable node in the ring.

单选题How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()ATraffic is switched from the first node receiving the AIS indication.BTraffic is switched from the far side of the failure, allowing handshaking to occur.CUPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.DUPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.

单选题The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN: access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 20 any access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 21 any How will the above access lists affect traffic? ()AFTP traffic from 192.169.1.22 will be deniedBNo traffic, except for FTP traffic will be allowed to exit E0CFTP traffic from 192.169.1.9 to any host will be deniedDAll traffic exiting E0 will be deniedEAll FTP traffic to network 192.169.1.9/29 will be denied

单选题Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()Athe log option for the particular SCREEN optionBthe permit option for the particular SCREEN optionCthe SCREEN option, because it does not drop traffic by defaultDthe alarm-without-drop option for the particular SCREEN option

单选题UPSR protection switching is initiated by (), while BLSR is initiated by ().Athe K1 SONET byte; the K2 SONET byteBthe K2 SONET byte;the K1 SONET byteCtransmitter switching;receiver detectionDLine Overhead bytes;Path Overhead bytesEPath Overhead bytes;Line Overhead bytes