Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Max-Forwards fields can be used in S1P messages to solve loop problems and avoid endless packet forwarding.

A.

wrong

B.

Right

(Single) A total of 100 multicast users on OLT are watching 20 multicast programs, assuming that each multicast program occupies 2M bandwidth, then how much multicast traffic is currently on the OLT upstream port

A.

200M

B.

100M

C.

40M

D.

50M

The scope of protection of the (multiple choice) GPON Type B dual attribution protection includes

A.

Primary and standby OLTs

B.

Primary and standby primary thousand fibers

C.

OlT's primary and standby PON should be ports

D.

Primary and standby branch fibers

OLT can perform traffic shaping through service-port.

A.

True

B.

False

Type B protection provides redundant protection for both OLT PON ports and backbone fibers when OLT or OLT PON If the port or trunk fiber fails, manually switch to another – luguang.

A.

True

B.

False

(Radio) When using the siP protocol, you need to use a local number graph for matching, if you use the default matching mode to match a 7-digit number beginning with 7727, then the following options are available?

The figure is

A.

Local-bitmap add huawei normal 7727xxx/7726.

B.

Local-digi tmap add huawei normal 772. /7727xxx

C.

Local-di gi tmap add huawei normal 7727

D.

Local-digitmap add huawei normal 7727xxx/7727

When ont fails or the hardware needs to be replaced, the ONT service needs to be replaced, and then the ONT service needs to be removed on the OLT, and then the new ONT service needs to be registered

A.

wrong

B.

Right

(Single choice) The following statement about the PITP protocol is incorrect

A.

The PITP protocol includes pitp P mode and PITP V mode

B.

The purpose of the PITP feature is to provide the upper authentication server with the physical location information of the access user, and the BRAS device can realize the user account and the press position after obtaining the user access location information

C.

Bind the authentication of the information to avoid the theft and roaming of the user account

D.

In pitp V mode, the user's physical location information is added to the PPPOE message sent by the user side to cooperate with the upper-level server for user authentication

E.

PITP P mode can also be called PPOE+ mode

(Single choice) In GPON systems, in order to prevent network monitoring, the most common method is.

A.

Information encryption

B.

Physical transport (not networked)

C.

Cableless network transmission

D.

Use leased line transmission

(Single)When you configure the HUAWEI NETWORK MANAGEMENT U2000 for FTTH IPTV service access, which of the following templates needs to be configured ().

A.

SNMP template

B.

MGC template

C.

IGMP template

D.

Value-added business templates