单选题What protection method is used in 4F BLSR networks?()AEach fiber has half of its SONET capacity reserved for protection.BTwo fibers in the span carry working traffic, while the other two fibers in the span are reserved for protection.CThe signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.DThe signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.
单选题
What protection method is used in 4F BLSR networks?()
A
Each fiber has half of its SONET capacity reserved for protection.
B
Two fibers in the span carry working traffic, while the other two fibers in the span are reserved for protection.
C
The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.
D
The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.
参考解析
解析:
暂无解析
相关考题:
Packet switching is a method of slicing(71) messages into parcels called "packets," sending the packets along different communication(72) as they become available, and then reassembling the packets(73) they arrive at their destination. Prior to the development of packet switching, early computer networks used leased, dedicated telephone circuits to(74) with terminals and other computers. In circuit-switched networks such as the telephone system, a complete point-to-point(75) is put together, and then communication can proceed.A.binaryB.usefulC.digitalD.analog
What is used to segment larger networks into smaller networks?() A.supernet masksB.subnet masksC.wildcard masksD.route filtering
What is the correct relative switching priority in a BLSR ring (higher to lower)?() A. signal fail, signal degrade, manual switchB. signal degrade, signal fail, manual switchC. protection lockout, manual switch, path AISD. forced switch, manual switch, signal degradeE. protection lockout, manual switch, forced switch
Why is an OC-3 2F-BLSR not feasible?() A. Switch times would exceed 50 ms for an OC-3 BLSR ring.B. An equal amount of working and protect bandwidth is required.C. DCC bandwidth is not large enough to handle K1/K2 processing.D. There is not enough bandwidth in an OC-3 ring to justify BLSR protection.
Click the Exhibit button. A customer has several interconnected core rings (see exhibit). They want to create several irtual rings?utilizing their OC-192 backbone (nodes 1,2,3,4). What should you recommend?()A. PPMN with BLSR ringsB. PPMN with UPSR ringsC. 1:N protection on all core circuitsD. multi-ring interconnect with BLSR rings
What are three advantages of VLANs?()A、VLANs establish broadcast domains in switched networks.B、VLANs utilize packet filtering to enhance network security.C、VLANs provide a method of conserving IP addresses in large networks.D、VLANs provide a low-latency internet working alternative to routed networks.E、VLANs allow access to network services based on department, not physical location.F、VLANs can greatly simplify adding, moving, or changing hosts on the network.
Which option describes the incorrect usage of the Label Distribution method?()A、LDP is primarily used in internal networks of MPLS-VPN providers.B、MP-BGP is used for label distribution for VPN customer routes.C、Directed LDP is used for label distribution in L2-VPN Attachement Circuits.D、MP-BGP is used for label distribution in MPLS Traffic Engineered networks.
What is the correct relative switching priority in a BLSR ring (higher to lower)?()A、signal fail, signal degrade, manual switchB、signal degrade, signal fail, manual switchC、protection lockout, manual switch, path AISD、forced switch, manual switch, signal degradeE、protection lockout, manual switch, forced switch
What is true regarding Autonomous Systems (AS )?()A、AS numbers are assigned by the IANAB、AS numbers are used by BGP (Border Gateway protocol ) to exchange IP routing information with neighboring ASC、In the internet, an Autonomous System (AS) is a collection of IP networks and routers under the controlD、All of the Above
What is the purpose of a network mask?()A、It is used in conjunction with the wildcard mask to determine the number of hosts on a networkB、It is used to define which parts of the IP address are allocated to host addresses and network prefixesC、It is used to hide subnets from external networks by masking the subnets with NATD、It is used to differentiate a network as a classful network or a classless network
A cluster administrator has defined a custom error notification method that will email and administrator when a temp error is detected on an individual hdisk. What method should be used to test this functionality?() A、 sendmail -biB、 yes /dev/kmemC、 emulate errlog entryD、 reducevg vgname hdisk#
How do you define the authentication method that will be used with AAA?()A、With the method aaa commandB、With the method commandC、With a method listD、With a method statement
In a switched LAN network, what is the Spanning-Tree algorithm used for?()A、It is used to provide a mechanism for routing updates in switched environments.B、It is used to prevent routing loops in networks with redundant routes.C、It is used to prevent switching loops in networks with redundant switched routes.D、It is used to manage, the addition, deletion, and naming of VLANs across multiple switches.E、It is used to segment a network into multiple collision domains.F、None of the above.G、All of the above are functions of STP.
What protection method is used in 4F MS-SPRing networks?()A、 Each fiber has half of its capacity reserved for protection.B、 Two fibers carry their full capacities while the other two fibers are reserved for protection.C、 The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.D、 The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.
单选题What protection method is used in 4F MS-SPRing networks?()A Each fiber has half of its capacity reserved for protection.B Two fibers carry their full capacities while the other two fibers are reserved for protection.C The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.D The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.
单选题Which option describes the incorrect usage of the Label Distribution method?()ALDP is primarily used in internal networks of MPLS-VPN providers.BMP-BGP is used for label distribution for VPN customer routes.CDirected LDP is used for label distribution in L2-VPN Attachement Circuits.DMP-BGP is used for label distribution in MPLS Traffic Engineered networks.
单选题How is UPSR and BLSR traffic rerouted during a protection switch when a complete fiber cable cut occurs?()ATraffic is switched from the first node receiving the AIS indication.BTraffic is switched from the far side of the failure, allowing handshaking to occur.CUPSR traffic is switched from the terminating node, BLSR traffic is rerouted from the originating node in the ring.DUPSR traffic is switched from the terminating node, circuit by circuit. BLSR traffic is rerouted from the last reachable node in the ring.
单选题Why is an OC-3 2F-BLSR not feasible?()ASwitch times would exceed 50 ms for an OC-3 BLSR ring.BAn equal amount of working and protect bandwidth is required.CDCC bandwidth is not large enough to handle K1/K2 processing.DThere is not enough bandwidth in an OC-3 ring to justify BLSR protection.
单选题What is used to segment larger networks into smaller networks?()Asupernet masksBsubnet masksCwildcard masksDroute filtering
单选题A cluster administrator has defined a custom error notification method that will email and administrator when a temp error is detected on an individual hdisk. What method should be used to test this functionality?()A sendmail -biB yes /dev/kmemC emulate errlog entryD reducevg vgname hdisk#
单选题What is true regarding Autonomous Systems (AS )?()AAS numbers are assigned by the IANABAS numbers are used by BGP (Border Gateway protocol ) to exchange IP routing information with neighboring ASCIn the internet, an Autonomous System (AS) is a collection of IP networks and routers under the controlDAll of the Above
单选题Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over anIPv4 network. Which tunneling method can be used to achieve this goal?()AGRE tunnelsBautomatic 6 to 4 tunnelsCISATAP tunnelsDmanual tunnels (RFC 2893)
单选题What teaching method is used by the teacher if much of his/her class time is spent on drilling sentence patterns followed by exercises like repetition, memorization, mimicry, etc?AThe Natural Approach.BThe Communicative Approach.CThe Audio-lingual Method.DThe Grammar-translation Method.
单选题How do you define the authentication method that will be used with AAA?()AWith the method aaa commandBWith the method commandCWith a method listDWith a method statement
多选题What are three advantages of VLANs?()AVLANs establish broadcast domains in switched networks.BVLANs utilize packet filtering to enhance network security.CVLANs provide a method of conserving IP addresses in large networks.DVLANs provide a low-latency internet working alternative to routed networks.EVLANs allow access to network services based on department, not physical location.FVLANs can greatly simplify adding, moving, or changing hosts on the network.
单选题What is the purpose of a network mask?()AIt is used in conjunction with the wildcard mask to determine the number of hosts on a networkBIt is used to define which parts of the IP address are allocated to host addresses and network prefixesCIt is used to hide subnets from external networks by masking the subnets with NATDIt is used to differentiate a network as a classful network or a classless network