Skip to content

LAN Switching and Wireless CCNA Exploration Companion Guide

Best in textbook rentals since 2012!

ISBN-10: 1587132079

ISBN-13: 9781587132070

Edition: 2nd 2008

Authors: Wayne Lewis

List price: $60.00
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

The all-new and only authorized textbook for the new Cisco Networking Academy CCNA Exploration LAN Switching and Wireless course A portable reference that supports the topics in the all-new Cisco Networking Academy CCNA Exploration LAN Switching and Wireless curriculum aligning 1:1 with course modules Features improved readability, enhanced topic explanations, real-world examples, and all-new graphical presentations Written and Edited by leading Academy Instructor LAN Switching and Wireless, CCNA Exploration Companion Guideis the official supplemental textbook for this CCNA Exploration course from the Cisco Networking Academy. Completely revised to match the new curriculum with new…    
Customers also bought

Book details

List price: $60.00
Edition: 2nd
Copyright year: 2008
Publisher: Cisco Press
Publication date: 4/28/2008
Binding: Mixed Media
Pages: 528
Size: 8.25" wide x 9.50" long x 1.25" tall
Weight: 2.442
Language: English

Wayne Lewis is a lifelong Alaskan gardener. He has worked with Jeff Lowenfels on many projects over the past 25 years, including the now national Plant a Row for the Hungry program (started in Anchorage by Jeff), which encourages gardeners to donate a portion of their harvest to charitable organizations in their community.

LAN Design
Objectives
Key Terms
Switched LAN Architecture
The Hierarchical Network Model
Access Layer
Distribution Layer
Core Layer
A Hierarchical Network in a Medium-Sized Business
Benefits of a Hierarchical Network
Principles of Hierarchical Network Design
Network Diameter
Bandwidth Aggregation
Redundancy
What Is a Converged Network?
Legacy Equipment
Advanced Technology
New Options
Separate Voice, Video, and Data Networks
Matching Switches to Specific LAN Functions
Considerations for Hierarchical Network Switches
Traffic Flow Analysis
User Community Analysis
Data Stores and Data Servers Analysis
Topology Diagrams
Switch Features
Switch Form Factors
Switch Performance
Power over Ethernet and Layer 3 Functionality
Switch Features in a Hierarchical Network
Access Layer Switch Features
Distribution Layer Switch Features
Core Layer Switch Features
Switches for Small and Medium Sized Business (SMB)
Catalyst Express 500
Catalyst 2960
Catalyst 3560
Catalyst 3750
Catalyst 4500
Catalyst 4900
Catalyst 6500
Comparing Switches
Summary
Labs
Check Your Understanding
Challenge Questions and Activities
Basic Switch Concepts and Configuration
Objectives
Key Terms
Introduction to Ethernet/802.3 LANs
Key Elements of Ethernet/802.3 Networks
CSMA/CD
Ethernet Communications
Duplex Settings
Switch Port Settings
Switch MAC Address Table
Design Considerations for Ethernet/802.3 Networks
Bandwidth and Throughput
Collision Domains
Broadcast Domains
Network Latency
Network Congestion
LAN Segmentation
LAN Design Considerations
Forwarding Frames Using a Switch
Switch Forwarding Methods
Symmetric and Asymmetric Switching
Memory Buffering
Layer 2 and Layer 3 Switching
Switch Management Configuration
Navigating Command-Line Interface Modes
GUI-Based Alternatives to the CLI
Using the Help Facility
Accessing the Command History
Switch Boot Sequence
Prepare to Configure the Switch
Basic Switch Configuration
Management Interface
Default Gateway
Duplex and Speed
HTTP Access
MAC Address Table Management
Verifying Switch Configuration
Basic Switch Management
Backing Up and Restoring Switch Configuration Files
Using a TFTP Server with Switch Configuration Files
Clearing Switch Configuration Information
Configuring Switch Security
Configuring Password Options
Securing Console Access
Securing Virtual Terminal Access
Securing Privileged EXEC Access
Encrypting Switch Passwords
Password Recovery
Login Banners
Configure Telnet and SSH
Configuring Telnet
Configuring SSH
Common Security Attacks
MAC Address Flooding
Spoofing Attacks
CDP Attacks
Telnet Attacks
Security Tools
Configuring Port Security
Securing Unused Ports
Summary
Labs
Check Your Understanding
Challenge Questions and Activities
VLANs
Objectives