Q: why are switch trunking modes ( dynamic auto , dynamic
desirable )used in switch while trunking? if only
negotiation is the factor it can be done with one mode as
well ie dynamic desirable . but why we need dynamic auto.
coz it dsnt negotiates ..at all
please post answer asap
thanks :
Answers were Sorted based on User's Feedback
Answer / jijiisme
both two mode are administrative mode. just for
administrative purpose only. this mean not really run for
the real because of security reason. I can explain how each
mode work.
dynamic desirable : initiates negotiation messages and
responds to negotiation messages to dynamically choose
whether to start using trunking, and defines the trunking
encapsulation.
I refer this definition form ICND2 book. the simple meaning
is the interface that used "dynamic desirable mode" is
define the encapsulation or protocol ( 802.1q or ISL). ISL
is not support now. so only one 802.1q left. So we can
simply define this mode is leader mode decision maker mode.
ok so the rest mode
dynamic auto : Passively waits to receive trunk negotiation
messages,at which point the switch will respond and
negotiate whether to use trunking, and if so, the type of
trunking.
I also refer this for ICND2 book.
this "dynamic auto" mean follower mode. right, that is
really simple.
when two interface connect one interface must be leader and
another must be follower : this condition is only for
administrative only.
in real word the mode "trunk" and protocol is defined by
admin for security purpose.
| Is This Answer Correct ? | 3 Yes | 0 No |
Identify the 3 pieces of hardware you would not install to prevent broadcasts? A.) Switch B.) Repeater C.) Bridge D.) Router
When would you use ISDN? A.) To connect LANs using POTS B.) To support applications requiring voice, data, and video C.) When you need a consistent and very high rate of data speed D.) To connect to IBM mainframes
Why ESP Transport mode is not compatible with NAT????? Though New IP Header in Tunnel mode & Original IP Header in Transport mode are out of Authentication & Encryption.
Identify 3 methods not used to prevent routing loops? A.) Holddown timers B.) Sequence numbers C.) Triggered updates D.) Split horizon E.) Area hierarchies F.) Order of router startup
Mention what is the difference between dynamic ip and static ip addressing?
Identify the default values that make up IGRP's composite metric? A.) Bandwidth B.) Load C.) Reliability D.) MTU E.) Delay
Utilizing RIP, what is the limit when it comes to number of hops?
What command can you type to view the connections after telneting into multiple routers simultaneously? A.) sh users B.) sh ports C.) sh host D.) sh sessions
Which of the following provide correct information about a protocol at the transport layer of the OSI model? A.) UDP - Provides Connectionless datagrams service B.) TCP - Provides Connection Oriented Services C.) SMTP - Provides Mail Exchange D.) IP - Route determination E.) TCP - Provides Flow Control and Error Checking F.) FTP - Transfers of Files
Why ip address called logical address?
Identify the X.25 addressing standard? A.) X.121 B.) X.25a C.) ITU-1 D.) Q933a
Can you give an overview of various components in IPSec?