When using the path method to create a client path, if there is an RLOS alarm on the line board, the path cannot be created.
When using the path method to create a client path, if there is an RLOS alarm on the line board, the path cannot be created.A . TRUEB . FALSEView AnswerAnswer: B
Which of the following descriptions about pointer adjustment is correct ?
Which of the following descriptions about pointer adjustment is correct ?A . When the rate of VC4 (frame rate) is higher than that of AU-4 (frame rate), it will be adjustedB . If the station detects that there is a low-level channel with a TU pointer adjustment event, it means...
When a signal with a standard Ethernet frame length of 64 Bytes is connected to the Ethernet board, if the QinQ function is enabled, what is the actual frame length of the signal inside the board?
When a signal with a standard Ethernet frame length of 64 Bytes is connected to the Ethernet board, if the QinQ function is enabled, what is the actual frame length of the signal inside the board?A . 64B . 84C . 68D . 80View AnswerAnswer: C
Which of the working modes provided by the line fiber quality monitoring function is not included?
Which of the working modes provided by the line fiber quality monitoring function is not included?A . Intra-office modeB . Near-end modeC . Automatic modeD . Manual modeView AnswerAnswer: C
When the input optical power of the OAU amplifier at the receiving end is lower than the nominal optical power, the following operations which is wrong?
When the input optical power of the OAU amplifier at the receiving end is lower than the nominal optical power, the following operations which is wrong?A . Adjust the adjustable optical attenuation before the receiving amplifier to increase the input optical power of the amplifierB . Set OAU gain so...
After starting the extended SSM protocol, in addition to judging the clock quality level and priority, it also judges the clock ID. After the network element receives the clock signal with ID, if it is judged that the clock signal is sent by the local station, the source is considered unavailable. In this way, even after passing through multiple sites, the network element can still recognize the clock signal sent by itself, preventing the formation of a timing loop.
After starting the extended SSM protocol, in addition to judging the clock quality level and priority, it also judges the clock ID. After the network element receives the clock signal with ID, if it is judged that the clock signal is sent by the local station, the source is considered...
For the relay OTU, all SM segment alarms are terminated at the local station and no longer sent downstream (except for OTUkLOF to insert ODUk_PI_AIS downstream). Other alarms continue to be transmitted to the downstream station and reported on the WDM side of the OTU (except for R_LOS to insert ODUK_PM_AIS to the downstream station)
For the relay OTU, all SM segment alarms are terminated at the local station and no longer sent downstream (except for OTUkLOF to insert ODUk_PI_AIS downstream). Other alarms continue to be transmitted to the downstream station and reported on the WDM side of the OTU (except for R_LOS to insert...
The length range of the DATA field in the Ethernet frame structure is?
The length range of the DATA field in the Ethernet frame structure is? A . 46-1500 bytesB . 46-1518 bytesC . Section 64-1518D . 64-1500 bytesView AnswerAnswer: A
Which of the following SOM systems cannot be monitored?
Which of the following SOM systems cannot be monitored?A . Main optical path performanceB . Type of originating FECC . Flatness of light performanceD . Input optical power of the receiving end OTUView AnswerAnswer: B
When using the path method to create OCh, which of the following service layer paths is necessary?
When using the path method to create OCh, which of the following service layer paths is necessary?A . ODUkB . OMSC . OTSD . ClientView AnswerAnswer: B