Skip to content

LAN Switching and Wireless CCNA Exploration Companion Guide

Best in textbook rentals since 2012!

ISBN-10: 1587132737

ISBN-13: 9781587132735

Edition: 2012

Authors: Wayne Lewis

List price: $60.00
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Each new purchase of an Exploration Companion guide comes with an exclusive coupon code that can be used to save 65% on these two additional study resources: 1.     CCENT/CCNA ICND1 640-822 Official Cert Guide, Premium Edition eBook and Practice Test (www.ciscopress.com/title/0132903822)2.     LAN Switching and Wireless Companion Guide eBook (www.ciscopress.com/title/0132877481) LAN Switching and Wireless, CCNA Exploration Companion Guideis the official supplemental textbook for the LAN Switching and Wireless course in the Cisco Networking Academy CCNA® Exploration curriculum version 4. This course provides a comprehensive approach to learning the technologies and protocols needed to design…    
Customers also bought

Book details

List price: $60.00
Copyright year: 2012
Publisher: Cisco Press
Publication date: 1/11/2012
Binding: Hardcover
Pages: 528
Size: 6.00" wide x 9.00" long x 1.25" tall
Weight: 1.408
Language: English

Wayne Lewis is a lifelong Alaskan gardener. He has worked with Jeff Lowenfels on many projects over the past 25 years, including the now national Plant a Row for the Hungry program (started in Anchorage by Jeff), which encourages gardeners to donate a portion of their harvest to charitable organizations in their community.

LAN Design
Objectives
Key Terms
Switched LAN Architecture
The Hierarchical Network Model
Access Layer
Distribution Layer
Core Layer
A Hierarchical Network in a Medium-Sized Business
Benefits of a Hierarchical Network
Principles of Hierarchical Network Design
Network Diameter
Bandwidth Aggregation
Redundancy
What Is a Converged Network?
Legacy Equipment
Advanced Technology
New Options
Separate Voice, Video, and Data Networks
Matching Switches to Specific LAN Functions
Considerations for Hierarchical Network Switches
Traffic Flow Analysis
User Community Analysis
Data Stores and Data Servers Analysis
Topology Diagrams
Switch Features
Switch Form Factors
Switch Performance
Power over Ethernet and Layer 3 Functionality
Switch Features in a Hierarchical Network
Access Layer Switch Features
Distribution Layer Switch Features
Core Layer Switch Features
Switches for Small and Medium Sized Business (SMB)
Catalyst Express 500
Catalyst 2960
Catalyst 3560
Catalyst 3750
Catalyst 4500
Catalyst 4900
Catalyst 6500
Comparing Switches
Summary
Labs
Check Your Understanding
Challenge Questions and Activities
Basic Switch Concepts and Configuration
Objectives
Key Terms
Introduction to Ethernet/802.3 LANs
Key Elements of Ethernet/802.3 Networks
CSMA/CD
Ethernet Communications
Duplex Settings
Switch Port Settings
Switch MAC Address Table
Design Considerations for Ethernet/802.3 Networks
Bandwidth and Throughput
Collision Domains
Broadcast Domains
Network Latency
Network Congestion
LAN Segmentation
LAN Design Considerations
Forwarding Frames Using a Switch
Switch Forwarding Methods
Symmetric and Asymmetric Switching
Memory Buffering
Layer 2 and Layer 3 Switching
Switch Management Configuration
Navigating Command-Line Interface Modes
GUI-Based Alternatives to the CLI
Using the Help Facility
Accessing the Command History
Switch Boot Sequence
Prepare to Configure the Switch
Basic Switch Configuration
Management Interface
Default Gateway
Duplex and Speed
HTTP Access
MAC Address Table Management
Verifying Switch Configuration
Basic Switch Management
Backing Up and Restoring Switch Configuration Files
Using a TFTP Server with Switch Configuration Files
Clearing Switch Configuration Information
Configuring Switch Security
Configuring Password Options
Securing Console Access
Securing Virtual Terminal Access
Securing Privileged EXEC Access
Encrypting Switch Passwords
Password Recovery
Login Banners
Configure Telnet and SSH
Configuring Telnet
Configuring SSH
Common Security Attacks
MAC Address Flooding
Spoofing Attacks
CDP Attacks
Telnet Attacks
Security Tools
Configuring Port Security
Securing Unused Ports
Summary
Labs
Check Your Understanding
Challenge Questions and Activities
VLANs
Objectives
Key Terms
Introducing VLANs
Defining VLANs
Benefits of VLANs
VLAN ID Ranges
Types of VLANs
Voice VLANs
Network Application Traffic Types
Switch Port Membership Modes
Controlling Broadcast Domains with VLANs
VLAN Trunking
VLAN Trunks
IEEE 802.1Q Frame Tagging
Native VLANs
Trunking Operation
Trunking Modes
Configure VLANs and Trunks
Configure a VLAN
Managing VLANs
Managing VLAN Memberships
Configure a Trunk
Troubleshooting VLANs and Trunks
Common Problems with Trunks
A Common Problem with VLAN Configurations
Summary
Labs
Check Your Understanding
Challenge Questions and Activities
VTP
Objectives
Key Terms
VTP Concepts
What Is VTP?
Benefits of VTP
VTP Components
VTP Operation
Default VTP Configuration
VTP Domains
VTP Advertising
VTP Configuration Revision Number
VTP Advertisement Types
VTP Modes
VTP Server-to-Client Behavior
VTP Server-to-Transparent-to-Client Behavior
VTP Pruning
VTP Pruning in Action
Configure VTP
Configuring VTP
Steps to Configuring VTP
Troubleshooting VTP Configurations
Incompatible VTP Versions
VTP Password Issues
Incorrect VTP Domain Name
All Switches Set to VTP Client Mode
VTP Troubleshooting Example
Managing VLANs on a VTP Server
Summary
Labs
Check Your Understanding
Challenge Questions and Activities
STP
Objectives
Key Terms
Redundant Layer 2 Topologies
Redundancy
Issues with Redundancy
Broadcast Storms
Duplicate Unicast Frames
Real-World Redundancy Issues
Loops in the Wiring Closet
Loops in Cubicles
Introduction to STP
Spanning-Tree Algorithm (STA)
STP Topology
Port Types in the Spanning-Tree Algorithm
Root Bridge
Best Paths
STP BPDU
BPDU Process
Bridge ID
Configure and Verify the BID
Port Roles
Configure Port Priority
Port Role Decisions
STP Port States and BPDU Timers
Cisco PortFast
STP Convergence
Elect a Root Bridge
Verify Root Bridge Election
Elect Root Ports
Verify Root Port Election
Elect Designated and Nondesignated Ports
Verify Designated and Nondesignated Port Election
STP Topology Change
PVST+, RSTP, and Rapid PVST+
Cisco and IEEE STP Variants
Per-VLAN Spanning-Tree (PVST) Overview
Per-VLAN Spanning-Tree Plus (PVST+) Overview
Rapid Spanning-Tree Protocol (RSTP) Overview
Multiple Spanning-Tree Protocol (MSTP) Overview
PVST+
Configure PVST+
RSTP
RSTP BPDU
Edge Ports
Link Types
RSTP Port States and Port Roles
RSTP Proposal and Agreement Process
Configuring Rapid PVST+
Design STP for Trouble Avoidance
Minimize the Number of Blocked Ports
Use Layer 3 Switching
Keep STP Even if It Is Unnecessary
Keep Traffic off of the Management VLAN
Troubleshoot STP Operation
PortFast Configuration Error
Network Diameter Issues
Summary
Labs
Check Your Understanding
Challenge Questions and Activities
Inter-VLAN Routing
Objectives
Key Terms
Inter-VLAN Routing
Introducing Inter-VLAN Routing
One-Router-Interface-per-VLAN
Router-on-a-Stick
Layer 3 Switch
Interfaces and Subinterfaces
One-Router-Interface-per-VLAN
Router-on-a-Stick
Considerations for Inter-VLAN Routing Methods
Configuring Inter-VLAN Routing
Configure Inter-VLAN Routing
Configure Router-on-a-Stick Inter-VLAN Routing
Troubleshooting Inter-VLAN Routing
Switch Configuration Issues
Switch Cisco IOS Commands for Troubleshooting
Router Configuration Issues
Router Cisco IOS Commands for Troubleshooting
IP Addressing Issues
IP Addressing Cisco IOS Verification Commands
Summary
Labs
Check Your Understanding
Challenge Questions and Activities
Basic Wireless Concepts and Configuration
Objectives
Key Terms
The Wireless LAN
Why Use Wireless?
Wireless LANs
Comparing a WLAN to a LAN
Wireless LAN Components
Wireless LAN Standards
Wi-Fi Certification
Wireless Infrastructure Components
Wireless NICs
Wireless Access Points
Wireless Routers
Wireless Operation
Configurable Wireless Parameters
Wireless Topologies
Wireless Association
Planning the Wireless LAN
Wireless LAN Security
Threats to Wireless Security
Rogue Access Points
Man-in-the-Middle Attacks
Denial of Service
Wireless Security Protocols
Authenticating the Wireless LAN
Wireless Encryption
Controlling Access to the WLAN
Configure Wireless LAN Access
Configuring the Wireless Access Point
Configuring Basic Wireless Settings
Configuring Wireless Security
Configuring a Wireless NIC
Scan for SSIDs
Select the Wireless Security Protocol
Verify Connectivity to the WLAN
Troubleshooting Simple WLAN Problems
A Systematic Approach to WLAN Troubleshooting
Solve Access Point Radio and Firmware Issues
Channel Settings
RF Interference
Access Point Placement
Authentication and Encryption
Summary
Labs
Check Your Understanding
Challenge Questions and Activities
Appendix: Check Your Understanding and Challenge Questions
Answer Key
Glossary