Q: why are switch trunking modes ( dynamic auto , dynamic
desirable )used in switch while trunking? if only
negotiation is the factor it can be done with one mode as
well ie dynamic desirable . but why we need dynamic auto.
coz it dsnt negotiates ..at all

please post answer asap
thanks :

Answers were Sorted based on User's Feedback



Q: why are switch trunking modes ( dynamic auto , dynamic desirable )used in switch while trunking?..

Answer / jijiisme

both two mode are administrative mode. just for
administrative purpose only. this mean not really run for
the real because of security reason. I can explain how each
mode work.

dynamic desirable : initiates negotiation messages and
responds to negotiation messages to dynamically choose
whether to start using trunking, and defines the trunking
encapsulation.

I refer this definition form ICND2 book. the simple meaning
is the interface that used "dynamic desirable mode" is
define the encapsulation or protocol ( 802.1q or ISL). ISL
is not support now. so only one 802.1q left. So we can
simply define this mode is leader mode decision maker mode.

ok so the rest mode

dynamic auto : Passively waits to receive trunk negotiation
messages,at which point the switch will respond and
negotiate whether to use trunking, and if so, the type of
trunking.

I also refer this for ICND2 book.

this "dynamic auto" mean follower mode. right, that is
really simple.

when two interface connect one interface must be leader and
another must be follower : this condition is only for
administrative only.

in real word the mode "trunk" and protocol is defined by
admin for security purpose.

Is This Answer Correct ?    3 Yes 0 No

Q: why are switch trunking modes ( dynamic auto , dynamic desirable )used in switch while trunking?..

Answer / vikram

thanks Jijiisme,, for promt post ..

Is This Answer Correct ?    1 Yes 2 No

Post New Answer

More CCNA Interview Questions

Why we used Virtual MAC in GLBP

0 Answers   Infosys,


3 router configured with RIP & Ripv2 rotuer 1- connected with router 2 having sr ip 10.0.1.2 routing : ripv2 router 2: connected with router 1 and router 3 having sr 0 ip 10.0.1.3 & sr 1 ip 11.0.1.2 routing :rip & ripv2 router 3: connected with router 2 having sr ip 11.0.1.3 routing: rip is there communication possible btween these networks ? if yes how

2 Answers  


What is size of ipv4 mac address?

0 Answers  


What is the draw back of ospf protocol?

0 Answers  


Which switching technology can reduce the size of a broadcast domain? A.) Cut-Through B.) Store-and-Forward C.) Spanning Tree Protocol D.) RARP E.) ARP F.) VLAN

2 Answers  






Which service uses telephone control messages and signals between the transfer points along the way to the called destination? A. Signaling System 7 (SS7) B. Time-division Multiplexing (TDM) C. X.25 D. Frame relay

1 Answers  


What are the steps of data encapsulation?

0 Answers  


What does 'P' mean when running a Trace? A.) Good route B.) Protocol unreachable C.) Source Quench D.) Destination unreachable

1 Answers  


Describe End to End network services: (Choose all that apply) A.) Best Route selection B.) Accomplished Segment by Segment, each segment is autonomous C.) Flow Control & Data Integrity D.) Best efforts packet delivery

1 Answers  


What is the protocol number for UDP? A.) 6 B.) 17 C.) 25 D.) 21

1 Answers  


What do the following commands accomplish? access-list 1 deny 172.16.4.0 0.0.0.255 access-list 1 permit any interface ethernet 0 IP access-group 1 out A. This will block traffic from subnet 172.16.4.0 and allow all other traffic. B. This will allow traffic from subnet 172.16.4.0 and block all other traffic. C. All traffic is allowed. D. All traffic is blocked.

1 Answers  


A user device that connects to a DCE must be which of the following? A.) DTE B.) CPE C.) Demarc D.) DCE E.) CO

1 Answers  


Categories