From the course: Cisco Network Security: Secure Routing and Switching

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Spanning-Tree Protocol

Spanning-Tree Protocol

From the course: Cisco Network Security: Secure Routing and Switching

Start my 1-month free trial

Spanning-Tree Protocol

- [Instructor] Spanning Tree Protocol is used on a local area network because in most cases switches have redundant links for fault tolerance. Spanning Tree Protocol maintains a loop-free network by pruning redundant links and monitors the state of the network and will change the pathways to fit the current link conditions in order to keep it operational. Switches use Bridge Protocol Data Units that are encapsulated in an ethernet frame. The BPDUs communicate information on the switch, such as the BridgeID, which is the Spanning Tree Priority number and the MAC address. To determine which switch is the root bridge, there is an election and the lowest BridgeID is elected as the root bridge of the network. The Root Bridge sits at the top of the spanning tree and all other switches branch out from the root. After election, each device determines the most efficient pathway to reach the root. The root sends BPDUs. If the root is unable to do the job, the next highest rank will become the…

Contents