A total of 100 multicast users on the OLT are watching 20 multicast programs. If each multicast program occupies a bandwidth of 2M, how much multicast traffic does the OLT uplink port currently have?

A total of 100 multicast users on the OLT are watching 20 multicast programs. If each multicast program occupies a bandwidth of 2M, how much multicast traffic does the OLT uplink port currently have?A . 200MB . 100MC . 40MD . 50M View Answer Answer: C...

Continue reading

When the backbone fiber is broken or the OLT cannot detect the expected optical signal (LOS) alarm, the possible cause is: (Multiple Choice)

When the backbone fiber is broken or the OLT cannot detect the expected optical signal (LOS) alarm, the possible cause is: (Multiple Choice)A . There is a rogue ON U under the portB . Port backbone fiber failureC . All power off or failures under the portD . The port laser is turned off...

Continue reading

A GPON Type C dual-homing protection is deployed for a power access service, and the status of the protection group and the uplink Ethernet port is set on the OLT. When the status of the Ethernet port associated with the protection group on the OLT becomes down, which of the following description is incorrect?

A GPON Type C dual-homing protection is deployed for a power access service, and the status of the protection group and the uplink Ethernet port is set on the OLT. When the status of the Ethernet port associated with the protection group on the OLT becomes down, which of the following description is incorrect?A...

Continue reading

When configuring the multicast service on the MA5600T/MA5680T, the multicast vlan program adopts the static configuration method. Which of the following options must be configured, otherwise the multicast program may not be watched?

When configuring the multicast service on the MA5600T/MA5680T, the multicast vlan program adopts the static configuration method. Which of the following options must be configured, otherwise the multicast program may not be watched?A . igmp profileB . igmp programC . igmp priorityD . igmp preview View Answer Answer: B...

Continue reading

When the invitation message sent by user A reaches user B after passing through servers C, D, and E, the server address recorded in the VIA field in the message received by user B from top to bottom is:

When the invitation message sent by user A reaches user B after passing through servers C, D, and E, the server address recorded in the VIA field in the message received by user B from top to bottom is:A . C->D->EB . E->C->DC . E->D->CD . C->E->D View Answer Answer: C...

Continue reading

The complete SIP message interaction process will include multiple request and response messages. A field can be used in the header field of the SIP message to describe the specific request corresponding to the current response message. This field is:

The complete SIP message interaction process will include multiple request and response messages. A field can be used in the header field of the SIP message to describe the specific request corresponding to the current response message. This field is:A . CseaB . CaLL-IDC . First lineD . Message body View Answer Answer: A...

Continue reading