Introduction to Rapid PVST+
In the previous section of this course, we examined the classical per-VLAN spanning tree (PVST+), which is based on the original STP (IEEE 802.1D).
In the previous section of this course, we examined the classical per-VLAN spanning tree (PVST+), which is based on the original STP (IEEE 802.1D).
In this lesson, we will go though the process of configuring different spanning-tree topologies per VLAN.
This lesson begins our discussion on Cisco's PVST (Per-VLAN Spanning-Tree) and PVST+ protocols. First, we are going to examine the inefficiencies of the original STP, and then we are going to show what improvements PVST brings to the network.
The lessons so far should be enough for you to understand how the original Spanning Tree protocol works (IEEE 802.1d). However, to really have a deep understanding that will stick with you for a long time, you must practice!
In the previous several lessons, we discuesed how the spanning tree protocol calculates the loop-free topology and how it works in a normal, stable situation. In this lesson, we will examine how the protocol behaves when a topology change occurs and it must reconverge.
In the previous lesson, we discussed the Spanning Tree port roles. Let's make a quick recap:
In this lesson, we begin our discussion of the Common Spanning Tree algorithm. We walk through the process of how the protocol works and what kind of messages it uses to exchange information between switches. Let's get started.
In this lesson, we begin our exploration of the original Spanning Tree Protocol (STP), also known as the Common Spanning Tree (CST). Introduced in the 1990s, it allowed Ethernet LANs to have backup links without causing loops.
Wireless security can be tricky because it introduces a lot of short acronyms and terms. For example, this lesson covers the most common wireless client authentication methods and technologies. It includes terms like WEP, OSA, SKA, PSK, TKIP, EAP, WPA, WPA2, and WPA3.