Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

H35-260 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

H35-260 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: HCSA-Field-Transmission & PTN V1.0
  • Last Update: May 29, 2024
  • Questions and Answers: 326
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

H35-260 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

H35-260 Practice Exam Questions with Answers HCSA-Field-Transmission & PTN V1.0 Certification

Question # 6

When the data is forwarded by the PTN device, when the value of the TYPE field of the Ethernet header is OxO8O0, which protocol is the encapsulated inner packet?

A.

ICMP

B.

IPX

C.

ARP

D.

IP

Full Access
Question # 7

When congestion occurs, what are the packet discarding methods supported by OptiX PTN 1900&3900?

A.

Tail Dro

B.

RED

C.

WRED

D.

CAR

Full Access
Question # 8

The loss of optical fiber mainly includes the following?

A.

Absorption loss

B.

Reflection Loss

C.

Bending loss

D.

Scatter loss

Full Access
Question # 9

Which of the following are the possible causes of PW failures in the network?

A.

When using LDP to create a PW, if the LDP session fails, the PW creation fails

B.

Physical link failure

C.

The Tunnel that hosts the PW itself has a communication problem

D.

When a PW is created in static mode, the IS-IS exchange route fails, resulting in unsuccessful PW creation

Full Access
Question # 10

What items are not included in the route advertisement of L3VPN

A.

Local CE to ingress PE routing information exchange

B.

Ingress PE to P routing information exchange

C.

Ingress PE to egress PE routing information exchange

D.

Egress PE to egress CE routing information

exchange

Full Access
Question # 11

In order to determine whether the optical fiber lines and connectors on the wavelength division side are normal, which of the following loopback methods is most suitable?

A.

Client-side outer loopback

B.

Client-side Inloop

C.

WDM side outer loopback

D.

WDM side inner loopback

Full Access
Question # 12

Which of the following descriptions is correct?

A.

SAToP encapsulation type processes the CES service by encapsulating the 32 time slots in the E1 frame as a whole and then transparently transmitting it to the opposite end

B.

SAToP supports time division suppression

C.

OptiX PTN supports encapsulating E1 frames of different connections into one PW

D.

One STM-1 channel contains 64 VC12 time slots

Full Access
Question # 13

In the SDH system, we can use the instrument to test the input jitter tolerance of the STM-N interface. Which of the following instruments can complete this function?

A.

Smartbits

B.

SDH Analyzer

C.

Spectrum analyzer

D.

Bit Error Tester

Full Access
Question # 14

Now NE1 and NE2 form a chain network, and E1 service is configured between NE1 and NE2. One day, the fiber from NE1 to NE2 is interrupted (each segment of the

reverse fiber). Which of the following alarms will NE2 report?

A.

MS_RDI

B.

HP_LOM

C.

AU_AIS

D.

LP_RDI

Full Access
Question # 15

During the negotiation between the two ends of the PTN LAG, the device with the smaller system priority number is the master device

A.

True

B.

False

Full Access
Question # 16

After the LAN is divided into VLANs, if computers in different VLANs want to communicate, IP routing needs to be established. Which of the following solutions can be used?

A.

STP

B.

L3 Switch

C.

L2 switch + router

D.

GVRP

Full Access
Question # 17

Which of the following descriptions about the reasons for the continuous adjustment of network element pointers is correct?

A.

The network element is located at the SDH/PDH boundary

B.

The frequency difference between the network element clock and the network clock

C.

There is a phase difference between the network element clock and the network clock

D.

The NE clock works in hold mode

Full Access
Question # 18

Which of the following statements is incorrect about the optical layer interfaces OTM-nm and OTM-nrm of OTN?

A.

n represents the number of wavelengths carried by the maximum capacity,

B.

m represents the rate. Value can be 1.2 or 3.

C.

r means OTM without OSC function

D.

OTM-nr.m with OSC signal is OTM-nm.

Full Access
Question # 19

Which of the following identification fields in the data packet header of each protocol layer cannot identify the upper layer data type carried by this layer

A.

TTL

B.

TYPE

C.

Protocol

D.

Source Port

Full Access
Question # 20

Any service cross-connect can only be configured in inter-board cross-connect, and does not require the participation of XCS boards

A.

True

B.

False

Full Access
Question # 21

There are five trigger conditions for the execution of protection switching. According to the priority of the trigger conditions, they are arranged from high to low. Which of the following is correct?

A.

Locked Switching>Forced Switching>Clear Switching>Automatic Switching>Manual Switching

B.

Clear Switching > Lock Switching > Forced Switching > Automatic Switching > Manual Switching

C.

Locked Switching>Clear Switching>Forced Switching>Automatic Switching>Manual Switching

D.

Clear Switching > Forced Switching > Locked Switching > Manual Switching > Automatic Switching

Full Access
Question # 22

Compared with PDH, which of the following are the main advantages of SDH?

A.

Interface Specification

B.

Synchronous Multiplexing

C.

Operation and maintenance

D.

Strong responsiveness

E.

High frequency band utilization

Full Access
Question # 23

When configuring LMSP, there are two switching modes: single turbulent cutting and inserting and double full switching. Single-ended switching does not require self-use protection

A.

True

B.

False

Full Access
Question # 24

When it is found that the local end reports the ETH_LOS alarm, the fault can be located by the switch-back method. If the alarm disappears after the ODF loops back to the local end, which of the following may be

the cause?

A.

The peer board or pigtail is faulty

B.

Line failure

C.

The local board or pigtail is faulty

D.

Device false positives

Full Access
Question # 25

MPLS was originally proposed to improve the forwarding speed of routers. It integrates the advantages of IP and ATM. What are the characteristics?

A.

Connectionless-oriented forwarding plane

B.

Connection-Oriented Forwarding Plane

C.

Connection-Oriented Control Plane

D.

Connectionless-oriented control plane

Full Access
Question # 26

Which of the following detection methods can locate the fault point of LSP?

A.

ZMPLS Tracert

B.

LT

C.

CC

D.

MPLS Ping

Full Access
Question # 27

The DCN red copper feature between network elements of PTN, which VLAN number is used by default for DCN self-communication between network elements.

A.

1024

B.

2048

C.

4094

D.

4096

Full Access
Question # 28

Which statement about MPLS OAM is wrong?

A.

The hardware supports the transmission of messages

B.

Support real-time monitoring of performance events such as packet loss rate and delay

C.

Can be used to trigger protection switching

D.

Tunnel's OAM and PW OAM are related and affect each other

Full Access
Question # 29

MPLS is used to label packets instead of IP forwarding. Which of the following descriptions about MPLS packet encapsulation are correct?

A.

The Type field in the ETH header is set to 0x8847 to indicate that it is followed by MPLS label encapsulation

B.

The nested encapsulation of MPLS can only be two layers, PW and Tunnel two layers of labels

C.

The MPLS label of the Tunnel carrying the PW, where the S bit is set to 1

D.

IP packets can be directly carried on the Tunnel

Full Access
Question # 30

When deploying LAG, which of the following can the traffic load sharing hash algorithm be based on?

A.

Source MAC

B.

Destination MAC

C.

Source and destination MAC.

D.

Source and Destination IP

E.

DSCP

Full Access
Question # 31

Which of the following factors is related to pointer adjustment?

A.

The clocks of each NE are not synchronized

B.

Rate

C.

Expenses

D.

Scrambling

Full Access
Question # 32

Which of the following descriptions about the PTN network deployment ring network intersecting ring are correct?

A.

Each ring operates independently, and when multiple rings intersect, they operate independently in pairs

B.

The intersection point requires business synchronization

C.

The intersection point requires business synchronization

D.

Once the business reaches the intersection, it will choose to cross the ring

Full Access
Question # 33

Qinia technology can be used when multiple users need to share the same VCTRUNK and use the same VLANID.

A.

True

B.

False

Full Access
Question # 34

When PTN carries LTE services, it forwards packets based on MPLS label switching. In the MPLS label, which identification field can be used as a PTN to distinguish the label

at the bottom of the stack?

A.

Label ID

B.

BS

C.

EXP

D.

TTL

Full Access
Question # 35

According to the deployment plan of the existing network, which protocol does not need to be deployed for the interconnection between PTN equipment and SGW?

A.

VRRP

B.

IP/VPN Hybrid FRR

C.

ETH-Trunk

D.

BFD

Full Access
Question # 36

The NCE network management supports a variety of external interfaces. Which of the following interfaces can be used when connecting with the network management equipment of other manufacturers?

A.

CORBA

B.

MML

C.

TL1

D.

QX

Full Access
Question # 37

Which of the following statements about the slave subrack SCC function is correct?

A.

Status management of boards from subracks

B.

DCN message forwarding

C.

Protection switching protocol processing of this subrack

D.

Handling of Overhead

Full Access
Question # 38

TCP provides connectionless-oriented, best-effort transport services

A.

True

B.

False

Full Access
Question # 39

Which of the following statements about the FEU board is false?

A.

The FIU board does not process monitoring information

B.

The FIU can complete the access and release of the OSC channel

C.

Using ESC, OTM station needs a FIU

D.

Using OSC, both OLA station and OADM station need two FIUs

Full Access
Question # 40

Which of the following are common reasons for pointer adjustment

A.

The clock source or clock source level is incorrectly configured, resulting in two clock sources or two NEs in the same network following each other, causing the AU and TU pointers to be adjusted

B.

The power supply of the subrack is faulty, which causes the clock board to work abnormally, and the AU and TU pointers are adjusted together.

C.

The fault of the cross-board board causes the clock quality of its distribution to be poor, causing the adjustment of the AU and TU pointers

D.

Road version failure, together with AU, TU pointer adjustment

Full Access
Question # 41

Which of the following functions does Netstar ODT have?

A.

Subrack verification

B.

Board Verification

C.

Fiber connection verification

D.

Optical power verification

Full Access
Question # 42

In which slots are the OptiX OSN 8800 T32 cross-connect boards fixed?

A.

8

B.

9

C.

10

D.

11

Full Access
Question # 43

Which of the following statements about switches and how they work is correct?

A.

The network managed by the switch belongs to a broadcast domain

B.

Learning based on the source MAC address and forwarding based on the destination MAC address

C.

Use the address aging mechanism to maintain the MAC address table

D.

When the destination MAC in the received Ethernet frame is not in its own address table, broadcast the frame to all ports

Full Access
Question # 44

Which of the following types of protection is electrical layer protection?

A.

Optical Line Protection QLP

B.

Tributary SNCP Protection

C.

Client side 1+1 protection

D.

+1 protection inside the board

Full Access
Question # 45

After a certain distance transmission in the wavelength division system, the optical signal-to-noise ratio of the signal at the receiving end will decrease to a certain extent. The main reason is which of the following?

A.

Use of EDFA

B.

Use of demultiplexer

C.

No new fiber is used

D.

Fiber attenuation is too large

Full Access
Question # 46

When the optical cable between the FIU and the FIU is faulty, what are the optical layer alarms reported by the downstream station?

A.

MUT LOS

B.

OSC_LOS

C.

R_LOS

D.

OSC RDI

Full Access
Question # 47

In the MPLS label field of the PTN network, which item is the identification field of the stack bottom label?

A.

Label ID

B.

EXP

C.

CS

D.

TTL

Full Access
Question # 48

What does the green PROG indicator on the PTN7900 board mean?

A.

The board works normally

B.

The service is active and the board is working

C.

The board software is initialized successfully and the software runs normally

D.

The business is working normally, and no business alarm is generated

Full Access
Question # 49

Which of the following statements about EDFA is false?

A.

The amplification of optical signal by EDFA is pure optical amplification, no need for photoelectric conversion

B.

Noise figure, saturated output power, gain flatness, gain, etc. are all important parameters to characterize EDFA

C.

1510nm optical monitoring channel can be effectively amplified by EDFA

D.

When the output power of the EDFA reaches saturation, increase the input optical power, and the gain of the EDFA will decrease.

Full Access
Question # 50

When the scheduling granularity of the N302 board is ODUflex, what are the supported protection types?

A.

ODUk SNCP Protection

B.

Tributary SNCP Protection

C.

In-board 1+1 protection

D.

Client side 1+1 protection

Full Access
Question # 51

Which of the following is a common wavelength in optical communication?

A.

850nm.1310nm.1500nm

B.

850nm, 1310nm.1550nm

C.

850nm, 1330nm, 1550nm

D.

800nm, 1310nm, 1550nm

Full Access
Question # 52

Plan the base station IP address network segment 10.1.1.0/26 Which of the following addresses can be used by the base station?

A.

10.1.1.0

B.

10.1.1 6?2

C.

wira

D.

10.1.1.64

Full Access
Question # 53

The purpose of setting the upper and lower threshold alarms for performance monitoring through professional network management does not include which of the following?

A.

Easy to analyze historical traffic

B.

If the data exceeds the upper and lower limits, the alarm will be reported to the network management as soon as possible

C.

In the report, the data that exceeds the reading value can be identified by the red mark

D.

Facilitates quick troubleshooting

Full Access
Question # 54

Which of the following descriptions about network protection switching test is wrong?

A.

Before testing, you need to set the 1:1 linear multiplex section protection mode to single-ended switching.

B.

During the protection switching of the linear multiplex section, the NE reports the APS_INDI and MS_APS_INDI_EX alarms

C.

SNCP protection is configured. When the laser of the interface connected to the opposite end is turned off, observe the SDH analyzer of the local end.

D.

There are two methods for testing the protection switching of the multiplex section: the single-ended loopback test method and the double-ended hanging meter

test method

Full Access
Question # 55

Which of the following is the service board type Y of MSTP equipment

A.

Interface board

B.

Service Processing Board

C.

Service processing board with interface

D.

Auxiliary board

Full Access
Question # 56

Which of the following descriptions about electrical layer service configuration is wrong?

A.

When the OCh service path exists, create the Client path directly, and the NMS can automatically create the OTUk and ODUk paths

B.

When there is an OCh service path, you can first search for the OTUK path, create the ODUk service layer path, and then create the Client path

C.

When the OCh service path exists, directly create the ODUk path, and the network management can automatically create the OTUk path

D.

After the logical fiber connection is completed, no path search operation is required, and the OTS path and OMS path can automatically

generate the

Full Access
Question # 57

Which of the following statements about multiplexed partial range error indication (MS-REI) is true

? B2 byte represents the transmission channel.

? M1 byte folder indicates the transmission channel

? MS-REI is sent from the receiver to the source.

? MS-REI is transmitted from source to receiver

? Indicates the number of bit errors detected by the receiver after receiving the MS signal.

A.

???

B.

???

C.

???

D.

???

Full Access
Question # 58

To determine whether the optical fiber lines and connectors on the wavelength division side are normal, which of the following loopback methods is most suitable?

A.

WDM side inner loopback

B.

WDM side outer loopback

C.

Client side loopback

D.

Client side outer loopback

Full Access
Question # 59

When the data is forwarded by the PTN device, when the value of the TYPE field of the Ethernet header is 8847, what protocol is the inner packet of the encapsulation?

A.

IP

B.

RARP

C.

ARP

D.

MPLS

Full Access
Question # 60

Which of the following combinations of dynamic optical add/drop multiplexing boards does not hold?

A.

WSD9+WSM9

B.

RDU9+RMU9

C.

WSD9+RMU9

D.

RDU9+WSM9

Full Access
Question # 61

When the PTN device forwards, how many bits does the MAC address have?

A.

32

B.

46

C.

48

D.

64

Full Access
Question # 62

Which one is correct about the description of MC-LAG on L2/13 nodes in LTE network?

A.

The L2VE interface can be directly selected as a member port of MC-LAG

B.

Configurable to load burden mode

C.

The higher the active/standby priority value, the lower the priority

D.

The heartbeat is carried by unidirectional LSP and configured with 1:1 protection

Full Access
Question # 63

Which of the following is the main structure of the N-way wavelength multiplexing WDM system?

A.

Optical wavelength conversion unit

B.

Wavelength Division Multiplexing Unit

C.

Optical Amplification Unit

D.

Monitoring Unit

E.

Intersection Unit

Full Access
Question # 64

The M40 board has 2 waves of access, and the power of each wave is -4dBm. So which of the following values is the power of the M40 output port? (M40 insertion loss is 6.5dBm)

A.

-8.5

B.

-1

C.

-10.5

D.

-7.5

Full Access
Question # 65

Which of the following protections are protected by electrical layer double transmission and selective reception?

A.

Client side 1+1 protection

B.

ODUK SNCP Protection

C.

SW SNCP Protection

D.

ODUK ring network protection

Full Access
Question # 66

Which of the following descriptions about single-site commissioning is wrong?

A.

After the hardware inspection of the single station is completed, make sure that all power switches are in the off position

B.

It is strictly forbidden to plug and unplug the power plug and PIU single board while electrified

C.

In the case of power failure, you can contact the board without wearing an anti-static wrist or anti-static gloves

D.

If the input voltage of the equipment is not within the required range, a rectification suggestion should be put forward, and power-on is strictly

prohibited

Full Access
Question # 67

Which of the following logical function blocks is used for multiplexing section switching?

A.

MST

B.

MSP

C.

SPI

D.

MSA

Full Access
Question # 68

In the Ethernet LAG, which of the following modes needs to enable the LACP protocol?

A.

Static mode

B.

Dynamic Mode

C.

Manual Mode

D.

Auto Mode

Full Access
Question # 69

Which of the following identification fields in the data packet header of each protocol layer cannot identify the upper layer data type carried by this layer?

A.

TYPE

B.

TTL

C.

Source Port

D.

Protocol

Full Access
Question # 70

Which of the following options are the basic requirements of DWDM system for light source

A.

Output standard and stable wavelength

B.

The method using direct modulation

C.

Larger dispersion tolerance

D.

Using LE

Full Access
Question # 71

In NG-SDH, the soft reset of the SDH board does not affect the running business, and the hard reset operation will affect the running business.

A.

True

B.

False

Full Access
Question # 72

Which of the following technologies is used in the dynamic BGP MPLS L3VPN to distinguish the same IP address prefix in different VPNs in the BGP protocol?

A.

VRF

B.

RD

C.

Export RD

D.

Import RD

Full Access
Question # 73

In Huawei's PTN-LTE solution, which of the following FRR technologies have been deployed?

A.

LDP FRR

B.

VPN FRR

C.

IP/VPN FRR

D.

TE FRR

Full Access
Question # 74

Which of the following network element forms supports the functions of branch and line, cross-multiplexing between lines and lines, and service adding and dropping functions?

A.

Terminal Multiplexer

B.

Add/Drop Multiplexer

C.

Regenerative Repeater

D.

Digital cross-connect equipment

Full Access
Question # 75

Which of the following layers of overhead belong to the electrical layer overhead of OTN

A.

OPUK

B.

ODUK

C.

OCH

D.

OTUK

Full Access
Question # 76

In the WDM transmission system, the main factors that affect the unevenness of the power balance of each channel do not include the following?

A.

Inhomogeneity of insertion loss of each channel of the combiner/demultiplexer

B.

The main channel adjustable optical attenuator setting is unreasonable

C.

EDFA gain unevenness

D.

The cable attenuation is too high

Full Access
Question # 77

Which of the following statements about the internal port attributes of an Ethernet board is incorrect?

A.

For the ingress port of the Tag Aware attribute: if the input data has a VLAN ID, the received data will be transparently transmitted

B.

For the ingress port of the Tag Aware attribute: if the input data does not have a VLAN ID, discard it

C.

For the ingress port of the Access attribute: if the input data does not have a VLAN ID, it will be transparently transmitted directly

D.

Ingress to the Access attribute: if the input data has a VLAN ID, discard the

Full Access
Question # 78

Which of the following descriptions of the electrical layer multiplexing and mapping steps of ODU0 is wrong?

A.

After mapping and multiplexing, the 2 ODU0 signals can be finally multiplexed into 1 OTU1IV signal

B.

After mapping and multiplexing of 8 ODU0 signals, it can be finally used as 1 OTU2V signal

C.

After mapping and multiplexing, 34 channels of ODU0 signals can be finally multiplexed into 1 channel of OTU3V signals

D.

After mapping and multiplexing, 80 channels of ODU0 signals are finally multiplexed into 1 channel of OTU4V

signals

Full Access
Question # 79

Which of the following statements about the advantages of QinQ is correct?

A.

Solve the problem of increasingly scarce public network VLAN ID resources

B.

Users can plan their own private network VLAN ID

C.

Provide a simpler L3VPN solution

D.

Make the user network more independent

Full Access
Question # 80

The international professional organization responsible for allocating P addresses has divided several network segments as private network segments, which can be freely allocated and used by people on the private network. What are the

following network segments belonging to private addresses?

A.

10.0.0.0/8

B.

172.16.0.0/12

C.

192.168.0.0/16

D.

224.0.0.0/8

Full Access
Question # 81

Both the 1310nm and 1550nm transmission windows are low-loss windows. In the DWDM system, only the 1550nm transmission window is used. Which of the following options is the main reason?

A.

EDFA operating wavelength flat region includes this window

B.

Small nonlinear effects in the 1550nm wavelength region

C.

1550nm wavelength region is suitable for long distance transmission

D.

1550nm window loss is smaller than 1310nm window

Full Access
Question # 82

CAR is deployed on PTN equipment. Which of the following descriptions is wrong?

A.

CBS bursts are marked in yellow

B.

Supports setting the processing mode for CAR-processed packets

C.

The unit of CBS/PBS is Bytes

D.

The value of PIR is required to be greater than or equal to CIR

Full Access
Question # 83

When performing single-site commissioning of SDH equipment, it is necessary to check the single-site hardware: including cabinet and subrack installation inspection, power line resistance measurement, cable layout specification

inspection, single-board appearance inspection, and some single-board inspections. DIP jumper check

A.

True

B.

False

Full Access
Question # 84

Optix Datacollector supports black box fault data collection for various products. Which of the following products are not supported?

A.

NG SDH

B.

WDM

C.

COS

D.

PTN

Full Access
Question # 85

In OptiX PTN, what interfaces can LMSP protect?

A.

CD1

B.

AD1

C.

POD41

D.

ASD1

Full Access
Question # 86

When configuring the L3VPN service, which operation will cause the service configuration to fail?

A.

The IP address configured before the Layer 3 port is added to the UNI of the L3VPN

B.

Create the UNI port from the base station direction as a VLAN aggregation sub-interface

C.

Enable ARP proxy on VLAN aggregation sub-interfaces

D.

The IPs of the two service access ports in the direction of the base station are the same IP

Full Access
Question # 87

The device IP addresses of gateway network elements and non-gateway network elements must be set in the same network segment

A.

True

B.

False

Full Access
Question # 88

Which of the following protection types is not supported by the L302 board?

A.

0DU3 SNCP

B.

Tributary SNCP

C.

SW SNCP

D.

In-board 1+1

Full Access
Question # 89

Which of the following is not included in the function of the Inspector inspection tool?

A.

Perform inspection tasks from the batch of relevant information obtained from NEs

B.

Collect network element performance data for inspection

C.

Support viewing inspection results and importing and exporting inspection data.

D.

Generate an inspection report according to the passing of inspection items and analyze the situation.

Full Access
Question # 90

Which of the following messages is sent in unicast mode

A.

ARP Request

B.

Peer BFD message

C.

DHCP Discover

D.

DHCP Request

Full Access
Question # 91

On the U2000 network management, you can make an inner ring and an outer ring on the PTNE1 port to facilitate testing

A.

True

B.

False

Full Access
Question # 92

When the bridge is using ML learning mode, create an entry in the MAC.Address gateway depending on the source MAC map and server port. This entry applies to all VANs

A.

True

B.

False

Full Access
Question # 93

When configuring electrical cross-connect services on NG WDM equipment, the client-side service types at both ends of a bidirectional service must be consistent.

A.

True

B.

False

Full Access
Question # 94

The multi-level connection monitoring mode (TCM) of OTN has three application forms. Which of the following is correct?

A.

Cascading mode

B.

Overlapping Mode

C.

Nested Mode

D.

Cascade Mode

Full Access
Question # 95

In the OSN6800 subrack, when the OTU is inserted in the 17th slot, electrical layer scheduling can be realized

A.

True

B.

False

Full Access
Question # 96

The characteristic of the open DWDM system is that there are no special requirements for the optical interface of the multiplexing terminal, and only these interfaces are required to comply with the optical interface standard

recommended by ITU-T. The DWDM system adopts wavelength conversion technology to convert the optical signal of the multiplexed terminal into a specific wavelength, and the optical signal of different terminal equipment is converted into

different wavelengths that comply with ITU-T recommendations, and then multiplexed.

A.

True

B.

False

Full Access
Question # 97

Which of the following does not belong to L3VPN?

A.

VPWS

B.

BGP/MPLS VPN

C.

GRE

D.

IPSec

Full Access