Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

H31-311_V2.5 Questions and Answers

Question # 6

Which of the following layers define the protocols that control the network layer? The protocol for this layer applies to logical links, i.e. end-to-end connectivity between two devices.

A.

Network layer

B.

Data link layer

C.

Transport Layer

D.

Application layer

Full Access
Question # 7

The value of the MFAS byte increases with the sequence number of the OTUk/ODUK base frame and includes the most () base frames.

A.

64

B.

128

C.

256

D.

512

Full Access
Question # 8

A PAUSE frames use reserved multicast addresses and are not forwarded by bridges or switches. In this way, the PAUSE frame does not generate any additional information.

A.

True

B.

Error

Full Access
Question # 9

In the SDH optical synchronous transmission system, which of the following bytes is used to transmit the quality and weight and usage information of the clock source?

A.

G1

B.

S1

C.

N1

D.

M1

Full Access
Question # 10

Which of the following communication protocols are used for DCN management of Huawei devices? (Multiple choice).

A.

HWECC

B.

TCP/IP

C.

FTP

D.

OSl

Full Access
Question # 11

After configuring PDH on a per-net element basis, the full trace cannot be searched. Which of the following is a possible cause? (Multiple choice)

A.

The tributary plate is not selected to be recited correctly.

B.

The board selection is incorrect.

C.

The time period is not configured correctly 5.

D.

Passthrough is not configured at the intermediate site. Correct answer)

Full Access
Question # 12

When setting up LCAS mode, follow these principles:

1. If both ends of the device are Huawei devices, please set it to "Standard Mode".

2. If a Huawei device is interconnected with a third-party device, set the interconnect device to the same mode according to the mode supported by the third-party device.

A.

True, yes

B.

False

Full Access
Question # 13

Which of the following is the frame indicated by the VC-4 J1 byte by the AU pointer of the current frame?

A.

Current framework

B.

Next frame

C.

Previous frame

D.

None of the above

Full Access
Question # 14

Which of the following is the multiplexing method of SDH?

A.

flexible mapping

B.

Asynchronous multiplexing

C.

flexible mapping and asynchronous multiplexing

D.

Flexible mapping and synchronization multiplexing

Full Access
Question # 15

When the U2000 is synchronized, the same network metadata as the U2000 is not uploaded to the U2000, and the data that exists on the U200 but does not exist on the network element is deleted.

A.

True

B.

False

Full Access
Question # 16

The difference between dispersion compensation fibers and ordinary optical fibers is that the dispersion compensation fibers have a negative dispersion coefficient at ().

A.

1310 nm

B.

1550nm

C.

800nm

D.

1650nm

Full Access
Question # 17

An unprotected chain consists of four net elements; ME1, NE2, NE3 and NE4.

Create an end-to-end VC4 path NE1-NE4 and add NE5 between NE2 and NE3 for capacity expansion.

The original configuration remains unchanged and no services are configured on the NE5.

In this case, the unprotected chain becomes NE1-NE2-NE5NE3-NE4, how many VC4 paths can be searched?

A.

0

B.

1

C.

2

D.

3

Full Access
Question # 18

Manual configuration will clear the data on the NE side

A.

True

B.

Error

Full Access
Question # 19

Which of the following is not the advantage of WDM?

A.

Large capacity and transparent data transfer

B.

Easy to upgrade and maximize protection for existing investments

C.

gold replacement for SDH equipment

D.

Future compatible with all optical switching networks

Full Access
Question # 20

Suppose 2 VC-12 time slots need to be bound to the VCTRUNK1 of the N2EFS4 board. When there are 8 VC4 slots on the N2EFS4 board, which of the following slots meets the requirements?

A.

VC-12 time slot 1 and 2 for the first VC4

B.

VC-12 time slots for the second VC4 33 and 34

C.

VC-12 time slots 1 and 2 for the fourth VC4

D.

VC-12 Time slots 1 and 2 for the 8th VC-4

Full Access
Question # 21

In the frame structure of the SDH signal, there are large overhead bytes for operation, management, and maintenance (OAM). Overhead bytes account for all bits () of the entire frame and greatly enhance the monitoring capabilities of the network.

A.

1/10

B.

1/20

C.

1/30

D.

1/40

Full Access
Question # 22

Some SNCP protection inversion conditions are default, such as AU-AIS and TU-AIS. Other conditions are optional, such as HP-TIM and HP-SLM. Optional conditions can be flexibly set according to the level of the costume.

A.

True

B.

Error

Full Access
Question # 23

Which of the following alerts does not trigger an AU-AIS alert?

A.

R-LOS

B.

MS-AIS

C.

AU-LOP ()

D.

B2-ExC

Full Access
Question # 24

The clock unit can only access the external clock source as the timing signal source of the system through the external clock interface. In addition; It can also output a processed clock and provide a clock source for other devices that need timing.

A.

True

B.

False

Full Access
Question # 25

Which of the following logic function blocks are involved in processing clock signals? (Multiple choice).

A.

SPl

B.

RST

C.

MCF

D.

SETS

Full Access
Question # 26

Which of the following is the meaning of SFD in the Ethernet frame structure?

A.

Preamble

B.

Frame check sequence

C.

start frame delimiter

D.

Payload

Full Access
Question # 27

Forced switching, fiber switching, manual switching and motion switching are decreased in order of priority.

A.

True

B.

Error

Full Access
Question # 28

Frame-Mapped GFP (GFPF> is a processing mode that targets data encoding blocks such as Fibre Channel and ESCON.

A.

True

B.

False

Full Access
Question # 29

The device IP address of the gateway element and the non-gateway element must be set in the same network segment.

A.

True

B.

Error

Full Access