Can anyone explain the load balancing of PVST+????
Answer / jitendera kumar sinha
In Ethernet switched environments where multiple Virtual
LANs exist, spanning tree can be implemented at each
vlan . and it is named as per VLAN spanning tree (PVST and
PVST+, which is the default protocol used by Cisco
switches). Both PVST and PVST+ protocols are Cisco
proprietary protocols.Since PVST treats each VLAN as a
separate network, it has the ability to load balance
traffic (at layer-2) by forwarding some VLANs on one trunk
and other Vlans on another trunk without causing a Spanning
Tree loop.
here one point is noted that scinse it is a
ciscoproprietary so it use isl encapsulation for trunking.
if you want to know that how to do that then here i canot
expalin how toconfigure that pvst+
| Is This Answer Correct ? | 2 Yes | 3 No |
hello sir , if i finish this certification is the job is conform ?? and in chennai were i can do this ??
Mention what is the difference between tcp and udp?
IPX traffic using different encapsulation types can go over the same data link A. true B. false
Can you explain in a generic manner the packet of IPSec?
Define topology?
hi all.. can any one explain the complete topology of stp and rstp how it works . root swtch connects to a root port and then root port conenct to other switchs designated port. i was going thru his site http://www.cisco.com/en/US/tech/tk389/tk621/technologies_whi te_paper09186a0080094cfa.shtml in which DR also exist on root switch only which makes my understanding grim.I had a diff notion of stp all together. please post asap. and if possible refer a url so thst i can read it my self .. thanks
Can anybody tell me how to configure a cisco router?
Which router component stores routing tables APP cache and packet buffers? A. ROM B. RAM C. AVRAM D. Flash memory
What is a function of a reliable transport layer connection? A. route selection B. acknowledgements C. session checkpoints D. system authentication
What is the subnetmask of / 27 in network based and host based?
Which of these is the Private key? A. Bear B. Cave C. Indian D. Cowboy
What is the extended IPX access list range? A.) 901-1000 B.) 100-199 C.) 900-999 D.) 1000-1000