Muutke küpsiste eelistusi

Switched Networks Companion Guide [Kõva köide]

  • Formaat: Hardback, 768 pages, kõrgus x laius x paksus: 233x211x29 mm, kaal: 1156 g
  • Ilmumisaeg: 29-May-2014
  • Kirjastus: Cisco Press
  • ISBN-10: 1587133296
  • ISBN-13: 9781587133299
  • Kõva köide
  • Hind: 76,81 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Hardback, 768 pages, kõrgus x laius x paksus: 233x211x29 mm, kaal: 1156 g
  • Ilmumisaeg: 29-May-2014
  • Kirjastus: Cisco Press
  • ISBN-10: 1587133296
  • ISBN-13: 9781587133299

Switched Networks Companion Guide is the official supplemental textbook for the Switched Networks course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.

This course describes the architecture, components, and operations of a converged switched network. You will learn about the hierarchical network design model and how to configure a switch for basic and advanced functionality. By the end of this course, you will be able to troubleshoot and resolve common issues with Virtual LANs and inter-VLAN routing in a converged network. You will also develop the knowledge and skills needed to implement a WLAN in a small-to-medium network.

The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

The book’s features help you focus on important concepts to succeed in this course:

  • Chapter objectives–Review core concepts by answering the focus questions listed at the beginning of each chapter.
  • Key terms–Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.
  • Glossary–Consult the comprehensive Glossary more than 300 terms.
  • Summary of Activities and Labs–Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.
  • Check Your Understanding–Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.

Related Title:

Switched Networks Lab Manual

ISBN-10: 1-58713-327-X

ISBN-13: 978-1-58713-327-5

  • How To–Look for this icon to study the steps you need to learn to perform certain tasks.
  • Interactive Activities–Reinforce your understanding of topics with all the different exercises from the online course identified throughout the book with this icon.
  • Videos–Watch the videos embedded within the online course.
  • Packet Tracer Activities–Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters.
  • Hands-on Labs–Work through all the course labs and Class Activities that are included in the course and published in the separate Lab Manual.

Introduction xix
Chapter 1 Introduction to Switched Networks
1(40)
Objectives
1(1)
Key Terms
1(1)
Introduction (1.0.1.1)
2(1)
LAN Design (1.1)
3(20)
Converged Networks (1.1.1)
3(1)
Growing Complexity of Networks (1.1.1.1)
3(2)
Elements of a Converged Network (1.1.1.2)
5(1)
Cisco Borderless Network (1.1.1.3)
6(1)
Hierarchy in the Borderless Switched Network (1.1.1.4)
7(2)
Access, Distribution, and Core Layers (1.1.1.5)
9(2)
Switched Networks (1.1.2)
11(1)
Role of Switched Networks (1.1.2.1)
12(1)
Form Factors (1.1.2.2)
13(2)
Traffic Flow (1.1.2.3)
15(1)
Multilayer Switching (1.1.2.4)
16(1)
Switch Features (1.1.3)
17(1)
Port Density (1.1.3.1)
17(2)
Forwarding Rates (1.1.3.2)
19(1)
Power over Ethernet (1.1.3.3)
19(2)
Cisco Catalyst Switch Breakdown (1.1.3.4)
21(2)
The Switched Environment (1.2)
23(12)
Frame Forwarding (1.2.1)
23(1)
Switching as a General Concept in Networking and Telecommunications (1.2.1.1)
23(2)
Dynamically Populating a Switch MAC Address Table (1.2.1.2)
25(3)
Switch Forwarding Methods (1.2.1.3)
28(1)
Store-and-Forward Switching (1.2.1.4)
29(1)
Cut-Through Switching (1.2.1.5)
30(1)
Switching Domains (1.2.2)
31(1)
Collision Domains (1.2.2.1)
32(1)
Broadcast Domains (1.2.2.2)
32(1)
Alleviating Network Congestion (1.2.2.3)
33(2)
Summary (1.3)
35(2)
Practice
37(1)
Class Activities
37(1)
Labs
37(1)
Packet Tracer Activities
37(1)
Check Your Understanding Questions
37(4)
Chapter 2 Basic Switching Concepts and Configuration
41(54)
Objectives
41(1)
Key Terms
41(1)
Introduction (2.0.1.1)
42(1)
Basic Switch Configuration (2.1)
43(16)
Configure a Switch with Initial Settings (2.1.1)
43(1)
Switch Boot Sequence (2.1.1.1)
43(1)
Recovering From a System Crash (2.1.1.2)
44(1)
Switch LED Indicators (2.1.1.3)
45(2)
Preparing for Basic Switch Management (2.1.1.4)
47(1)
Configuring Basic Switch Management Access with IPv4 (2.1.1.5)
47(3)
Configure Switch Ports (2.1.2)
50(1)
Duplex Communication (2.1.2.1)
50(1)
Configure Switch Ports at the Physical Layer (2.1.2.2)
51(1)
Auto-MDIX (2.1.2.3)
52(1)
Verifying Switch Port Configuration (2.1.2.4)
53(2)
Network Access Layer Issues (2.1.2.5)
55(3)
Troubleshooting Network Access Layer Issues (2.1.2.6)
58(1)
Switch Security: Management and Implementation (2.2)
59(29)
Secure Remote Access (2.2.1)
60(1)
SSH Operation (2.2.1.1)
60(2)
Configuring SSH (2.2.1.2)
62(2)
Verifying SSH (2.2.1.3)
64(2)
Security Concerns in LANs (2.2.2)
66(1)
Common Security Attacks: MAC Address Flooding (2.2.2.1)
66(3)
Common Security Attacks: DHCP Spoofing (2.2.2.2)
69(1)
Common Security Attacks: Leveraging CDP (2.2.2.3)
70(2)
Security Best Practices (2.2.3)
72(1)
Best Practices (2.2.3.1)
72(1)
Network Security Tools and Testing (2.2.3.2)
73(1)
Network Security Audits (2.2.3.3)
74(1)
Switch Port Security (2.2.4)
74(1)
Secure Unused Ports (2.2.4.1)
74(1)
DHCP Snooping (2.2.4.2)
75(2)
Port Security: Operation (2.2.4.3)
77(1)
Port Security: Violation Modes (2.2.4.4)
78(2)
Port Security: Configuring (2.2.4.5)
80(1)
Port Security: Verifying (2.2.4.6)
81(2)
Ports in Error-Disabled State (2.2.4.7)
83(2)
Network Time Protocol (NTP) (2.2.4.8)
85(3)
Summary (2.3)
88(2)
Practice
90(1)
Class Activities
90(1)
Labs
90(1)
Packet Tracer Activities
90(1)
Check Your Understanding Questions
91(4)
Chapter 3 VLANs
95(56)
Objectives
95(1)
Key Terms
95(1)
Introduction (3.0.1.1)
96(1)
VLAN Segmentation (3.1)
97(12)
Overview of VLANs (3.1.1)
97(1)
VLAN Definitions (3.1.1.1)
97(1)
Benefits of VLANs (3.1.1.2)
98(1)
Types of VLANs (3.1.1.3)
99(2)
Voice VLANs (3.1.1.4)
101(1)
VLANs in a Multiswitch Environment (3.1.2)
102(1)
VLAN Trunks (3.1.2.1)
102(1)
Controlling Broadcast Domains with VLANs (3.1.2.2)
103(2)
Tagging Ethernet Frames for VLAN Identification (3.1.2.3)
105(1)
Native VLANs and 802.1Q Tagging (3.1.2.4)
106(1)
Voice VLAN Tagging (3.1.2.5)
107(2)
VLAN Implementations (3.2)
109(29)
VLAN Assignment (3.2.1)
109(1)
VLAN Ranges on Catalyst Switches (3.2.1.1)
110(1)
Creating a VLAN (3.2.1.2)
111(1)
Assigning Ports to VLANs (3.2.1.3)
112(1)
Changing VLAN Port Membership (3.2.1.4)
113(3)
Deleting VLANs (3.2.1.5)
116(1)
Verifying VLAN Information (3.2.1.6)
117(2)
VLAN Trunks (3.2.2)
119(1)
Configuring IEEE 802.1Q Trunk Links (3.2.2.1)
119(2)
Resetting the Trunk to the Default State (3.2.2.2)
121(2)
Verifying Trunk Configuration (3.2.2.3)
123(1)
Dynamic Trunking Protocol (3.2.3)
124(1)
Introduction to DTP (3.2.3.1)
125(1)
Negotiated Interface Modes (3.2.3.2)
126(2)
Troubleshoot VLANs and Trunks (3.2.4)
128(1)
IP Addressing Issues with VLAN (3.2.4.1)
128(1)
Missing VLANs (3.2.4.2)
129(2)
Introduction to Troubleshooting Trunks (3.2.4.3)
131(1)
Common Problems with Trunks (3.2.4.4)
132(1)
Trunk Mode Mismatches (3.2.4.5)
133(2)
Incorrect VLAN List (3.2.4.6)
135(3)
VLAN Security and Design (3.3)
138(6)
Attacks on VLANs (3.3.1)
138(1)
Switch Spoofing Attack (3.3.1.1)
138(1)
Double-Tagging Attack (3.3.1.2)
139(1)
PVLAN Edge (3.3.1.3)
140(2)
VLAN Best Practices (3.3.2)
142(1)
VLAN Design Guidelines (3.3.2.1)
142(2)
Summary (3.4)
144(2)
Practice
146(1)
Class Activities
146(1)
Labs
146(1)
Packet Tracer Activities
146(1)
Check Your Understanding Questions
147(4)
Chapter 4 LAN Redundancy
151(76)
Objectives
151(1)
Key Terms
151(2)
Introduction (4.0.1.1)
153(1)
Spanning Tree Concepts (4.1)
154(28)
STP Operation (4.1.2)
154(1)
Redundancy at OSI Layers 1 and 2 (4.1.1.1)
154(2)
Issues with Layer 1 Redundancy: MAC Database Instability (4.1.1.2)
156(5)
Issues with Layer 1 Redundancy: Broadcast Storms (4.1.1.3)
161(1)
Issues with Layer 1 Redundancy: Duplicate Unicast Frames (4.1.1.4)
161(1)
STP Operation (4.1.2)
162(1)
Spanning Tree Algorithm: Introduction (4.1.2.1)
162(3)
Spanning Tree Algorithm: Port Roles (4.1.2.2)
165(2)
Spanning Tree Algorithm: Root Bridge (4.1.2.3)
167(1)
Spanning Tree Algorithm: Path Cost (4.1.2.4)
168(3)
802.1D BPDU Frame Format (4.1.2.5)
171(2)
BPDU Propagation and Process (4.1.2.6)
173(5)
Extended System ID (4.1.2.7)
178(4)
Varieties of Spanning Tree Protocols (4.2)
182(11)
Overview (4.2.1)
182(1)
List of Spanning Tree Protocols (4.2.1.1)
182(1)
Characteristics of the Spanning Tree Protocols (4.2.1.2)
183(2)
PVST+ (4.2.2)
185(1)
Overview of PVST+ (4.2.2.1)
185(1)
Port States and PVST+ Operation (4.2.2.2)
186(2)
Extended System ID and PVST+ Operation (4.2.2.3)
188(1)
Rapid PVST+ (4.2.3)
189(1)
Overview of Rapid PVST+ (4.2.3.1)
189(1)
RSTP BPDU (4.2.3.2)
190(2)
Edge Ports (4.2.3.3)
192(1)
Link Types (4.2.3.4)
192(1)
Spanning Tree Configuration (4.3)
193(17)
PVST+ Configuration (4.3.1)
193(1)
Catalyst 2960 Default Configuration (4.3.1.1)
194(1)
Configuring and Verifying the Bridge ID (4.3.1.2)
194(2)
PortFast and BPDU Guard (4.3.1.3)
196(3)
PVST+ Load Balancing (4.3.1.4)
199(3)
Rapid PVST+ Configuration (4.3.2)
202(1)
Spanning Tree Mode (4.3.2.1)
202(3)
STP Configuration Issues (4.3.3)
205(1)
Analyzing the STP Topology (4.3.3.1)
205(1)
Expected Topology Versus Actual Topology (4.3.3.2)
206(1)
Overview of Spanning Tree Status (4.3.3.3)
207(1)
Spanning Tree Failure Consequences (4.3.3.4)
207(3)
Repairing a Spanning Tree Problem (4.3.3.5)
210(1)
First Hop Redundancy Protocols (4.4)
210(10)
Concept of First Hop Redundancy Protocols (4.4.1)
211(1)
Default Gateway Limitations (4.4.1.1)
211(1)
Router Redundancy (4.4.1.2)
212(1)
Steps for Router Failover (4.4.1.3)
213(1)
Varieties of First Hop Redundancy Protocols (4.4.2)
214(1)
First Hop Redundancy Protocols (4.4.2.1)
214(1)
FHRP Verification (4.4.3)
215(1)
HSRP Verification (4.4.3.1)
216(1)
GLBP Verification (4.4.3.2)
217(3)
Summary (4.5)
220(1)
Practice
221(1)
Class Activities
221(1)
Labs
221(1)
Packet Tracer Activities
221(1)
Check Your Understanding Questions
222(5)
Chapter 5 Link Aggregation
227(24)
Objectives
227(1)
Key Terms
227(1)
Introduction (5.0.1.1)
228(1)
Link Aggregation Concepts (5.1)
228(7)
Link Aggregation (5.1.1)
229(1)
Introduction to Link Aggregation (5.1.1.1)
229(1)
Advantages of EtherChannel (5.1.1.2)
230(1)
EtherChannel Operation (5.1.2)
231(1)
Implementation Restrictions (5.1.2.1)
231(1)
Port Aggregation Protocol (5.1.2.2)
232(2)
Link Aggregation Control Protocol (5.1.2.3)
234(1)
Link Aggregation Configuration (5.2)
235(10)
Configuring EtherChannel (5.2.1)
235(1)
Configuration Guidelines (5.2.1.1)
236(1)
Configuring Interfaces (5.2.1.2)
237(1)
Verifying and Troubleshooting EtherChannel (5.2.2)
238(1)
Verifying EtherChannel (5.2.2.1)
238(3)
Troubleshooting EtherChannel (5.2.2.2)
241(4)
Summary (5.3)
245(1)
Practice
246(1)
Class Activities
246(1)
Labs
246(1)
Packet Tracer Activities
246(1)
Check Your Understanding Questions
247(4)
Chapter 6 Inter-VLAN Routing
251(52)
Objectives
251(1)
Key Terms
251(1)
Introduction (6.0.1.1)
252(1)
Inter-VLAN Routing Configuration (6.1)
252(18)
Inter-VLAN Routing Operation (6.1.1)
253(1)
What Is Inter-VLAN Routing? (6.1.1.1)
253(1)
Legacy Inter-VLAN Routing (6.1.1.2)
254(1)
Router-on-a-Stick Inter-VLAN Routing (6.1.1.3)
255(1)
Multilayer Switch Inter-VLAN Routing (6.1.1.4)
256(1)
Configure Legacy Inter-VLAN Routing (6.1.2)
257(1)
Configure Legacy Inter-VLAN Routing: Preparation (6.1.2.1)
257(2)
Configure Legacy Inter-VLAN Routing: Switch Configuration (6.1.2.2)
259(1)
Configure Legacy Inter-VLAN Routing: Router Interface Configuration (6.1.2.3)
260(2)
Configure Router-on-a-Stick Inter-VLAN Routing (6.1.3)
262(1)
Configure Router-on-a-Stick: Preparation (6.1.3.1)
262(2)
Configure Router-on-a-Stick: Switch Configuration (6.1.3.2)
264(1)
Configure Router-on-a-Stick: Router Subinterface Configuration (6.1.3.3)
265(1)
Configure Router-on-a-Stick: Verifying Subinterfaces (6.1.3.4)
266(2)
Configure Router-on-a-Stick: Verifying Routing (6.1.3.5)
268(2)
Troubleshoot Inter-VLAN Routing (6.2)
270(10)
Inter-VLAN Configuration Issues (6.2.1)
270(1)
Switch Port Issues (6.2.1.1)
270(2)
Verify Switch Configuration (6.2.1.2)
272(1)
Interface Issues (6.2.1.3)
273(1)
Verify Router Configuration (6.2.1.4)
274(2)
IP Addressing Issues (6.2.2)
276(1)
Errors with IP Addresses and Subnet Masks (6.2.2.1)
276(2)
Verifying IP Address and Subnet Mask Configuration Issues (6.2.2.2)
278(2)
Layer 3 Switching (6.3)
280(15)
Layer 3 Switching Operation and Configuration (6.3.1)
280(1)
Introduction to Layer 3 Switching (6.3.1.1)
280(2)
Inter-VLAN Routing with Switch Virtual Interfaces (6.3.1.2)
282(2)
Inter-VLAN Routing with Routed Ports (6.3.1.4)
284(1)
Configuring Static Routes on a Catalyst 2960 Switch (6.3.1.5)
285(6)
Troubleshoot Layer 3 Switching (6.3.2)
291(1)
Layer 3 Switch Configuration Issues (6.3.2.1)
291(1)
Example: Troubleshooting Layer 3 Switching (6.3.2.2)
292(3)
Summary (6.4)
295(1)
Practice
296(1)
Class Activities
296(1)
Labs
296(1)
Packet Tracer Activities
296(1)
Check Your Understanding Questions
297(6)
Chapter 7 DHCP
303(60)
Objectives
303(1)
Key Terms
303(2)
Introduction (7.0.1.1)
305(1)
Dynamic Host Configuration Protocol v4 (7.1)
306(25)
DHCPv4 Operation (7.1.1)
306(1)
Introducing DHCPv4 (7.1.1.1)
306(1)
DHCPv4 Operation (7.1.1.2)
307(4)
DHCPv4 Message Format (7.1.1.3)
311(2)
DHCPv4 Discover and Offer Messages (7.1.1.4)
313(2)
Configuring a Basic DHCPv4 Server (7.1.2)
315(1)
Configuring a Basic DHCPv4 Server (7.1.2.1)
315(3)
Verifying DHCPv4 (7.1.2.2)
318(4)
DHCPv4 Relay (7.1.2.3)
322(3)
Configure DHCPv4 Client (7.1.3)
325(1)
Configuring a Router as DHCPv4 Client (7.1.3.1)
325(1)
Configuring a SOHO Router as a DHCPv4 Client (7.1.3.2)
326(1)
Troubleshoot DHCPv4 (7.1.4)
327(1)
Troubleshooting Tasks (7.1.4.1)
327(2)
Verify Router DHCPv4 Configuration (7.1.4.2)
329(1)
Debugging DHCPv4 (7.1.4.3)
330(1)
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) (7.2)
331(26)
SLAAC and DHCPv6 (7.2.1)
331(1)
Stateless Address Autoconfiguration (SLAAC) (7.2.1.1)
331(2)
SLAAC Operation (7.2.1.2)
333(2)
SLAAC and DHCPv6 (7.2.1.3)
335(1)
SLAAC Option (7.2.1.4)
336(1)
Stateless DHCPv6 Option (7.2.1.5)
337(1)
Stateful DHCPv6 Option (7.2.1.6)
338(1)
DHCPv6 Operations (7.2.1.7)
339(3)
Stateless DHCPv6 (7.2.2)
342(1)
Configuring a Router as a Stateless DHCPv6 Server (7.2.2.1)
342(2)
Configuring a Router as a Stateless DHCPv6 Client (7.2.2.2)
344(1)
Verifying Stateless DHCPv6 (7.2.2.3)
344(2)
Stateful DHCPv6 Server (7.2.3)
346(1)
Configuring a Router as a Stateful DHCPv6 Server (7.2.3.1)
346(3)
Configuring a Router as a Stateful DHCPv6 Client (7.2.3.2)
349(1)
Verifying Stateful DHCPv6 (7.2.3.3)
349(2)
Configuring a Router as a DHCPv6 Relay Agent (7.2.3.4)
351(1)
Troubleshoot DHCPv6 (7.2.4)
352(1)
Troubleshooting Tasks (7.2.4.1)
353(1)
Verify Router DHCPv6 Configuration (7.2.4.2)
354(1)
Debugging DHCPv6 (7.2.4.3)
355(2)
Summary (7.3)
357(2)
Practice
359(1)
Class Activities
359(1)
Labs
359(1)
Packet Tracer Activities
359(1)
Check Your Understanding Questions
360(3)
Chapter 8 Wireless LANs
363(102)
Objectives
363(1)
Key Terms
363(4)
Introduction (8.0.1.1)
367(1)
Wireless Concepts (8.1)
367(28)
Introduction to Wireless (8.1.1)
367(1)
Supporting Mobility (8.1.1.1)
368(1)
Benefits of Wireless (8.1.1.2)
368(1)
Wireless Technologies (8.1.1.3)
369(1)
Radio Frequencies (8.1.1.4)
370(1)
802.11 Standards (8.1.1.5)
371(2)
Wi-Fi Certification (8.1.1.6)
373(2)
Comparing WLANs to a LAN (8.1.1.7)
375(1)
Components of WLANs (8.1.2)
376(1)
Wireless NICs (8.1.2.1)
376(1)
Wireless Home Router (8.1.2.2)
377(2)
Business Wireless Solutions (8.1.2.3)
379(1)
Wireless Access Points (8.1.2.4)
380(2)
Small Wireless Deployment Solutions (8.1.2.5)
382(3)
Large Wireless Deployment Solutions (8.1.2.6)
385(2)
Large Wireless Deployment Solutions, Cont. (8.1.2.7)
387(2)
Wireless Antennas (8.1.2.8)
389(2)
802.11 WLAN Topologies (8.1.3)
391(1)
802.11 Wireless Topology Modes (8.1.3.1)
391(1)
Ad Hoc Mode (8.1.3.2)
392(1)
Infrastructure Mode (8.1.3.3)
393(2)
Wireless LAN Operations (8.2)
395(25)
802.11 Frame Structure (8.2.1)
395(1)
Wireless 802.11 Frame (8.2.1.1)
395(2)
Frame Control Field (8.2.1.2)
397(2)
Wireless Frame Type (8.2.1.3)
399(1)
Management Frames (8.2.1.4)
400(2)
Control Frames (8.2.1.5)
402(1)
Wireless Operation (8.2.2)
403(1)
Carrier Sense Multiple Access with Collision Avoidance (8.2.2.1)
404(1)
Wireless Clients and Access Point Association (8.2.2.2)
405(1)
Association Parameters (8.2.2.3)
406(3)
Discovering APs (8.2.2.4)
409(2)
Authentication (8.2.2.5)
411(2)
Channel Management (8.2.3)
413(1)
Frequency Channel Saturation (8.2.3.1)
413(2)
Selecting Channels (8.2.3.2)
415(3)
Planning a WLAN Deployment (8.2.3.3)
418(2)
Wireless LAN Security (8.3)
420(15)
WLAN Threats (8.3.1)
420(1)
Securing Wireless (8.3.1.1)
420(2)
DoS Attack (8.3.1.2)
422(1)
Management Frame DoS Attacks (8.3.1.3)
423(2)
Rogue Access Points (8.3.1.4)
425(1)
Man-in-the-Middle Attack (8.3.1.5)
426(2)
Securing WLANs (8.3.2)
428(1)
Wireless Security Overview (8.3.2.1)
428(2)
Shared Key Authentication Methods (8.3.2.2)
430(2)
Encryption Methods (8.3.2.3)
432(1)
Authenticating a Home User (8.3.2.4)
432(2)
Authentication in the Enterprise (8.3.2.5)
434(1)
Wireless LAN Configuration (8.4)
435(25)
Configure a Wireless Router (8.4.1)
435(1)
Configuring a Wireless Router (8.4.1.1)
435(2)
Setting Up and Installing Initial Linksys EA6500 (8.4.1.2)
437(4)
Configuring the Linksys Smart Wi-Fi Home Page (8.4.1.3)
441(2)
Smart Wi-Fi Settings (8.4.1.4)
443(3)
Smart Wi-Fi Tools (8.4.1.5)
446(4)
Backing Up a Configuration (8.4.1.6)
450(2)
Configuring Wireless Clients (8.4.2)
452(1)
Connecting Wireless Clients (8.4.2.1)
452(1)
Troubleshoot WLAN Issues (8.4.3)
453(1)
Troubleshooting Approaches (8.4.3.1)
453(2)
Wireless Client Not Connecting (8.4.3.2)
455(1)
Troubleshooting When the Network Is Slow (8.4.3.3)
456(2)
Updating Firmware (8.4.3.4)
458(2)
Summary (8.5)
460(1)
Practice
461(1)
Class Activities
461(1)
Labs
462(1)
Packet Tracer Activities
462(1)
Check Your Understanding Questions
462(3)
Appendix A Answers to "Check Your Understanding" Questions 465(12)
Glossary 477(26)
Index 503
Erich Spengler is the Director for the Center for System Security and Information Assurance, based at Moraine Valley CC. Erich is a Professor of Computer Integrated Technologies at Moraine Valley and has been teaching Cisco Academy courses for over 15 years. Erich is an ITQ-certified instructor for Cisco Academy. Erich is an active CISSP and has helped dozens of others earn the CISSP designation.

 

Erich has over 25 years of professional experience in IT systems and security. Erichs Center has trained over 1000 faculty since 2003 in VMware, CyberSecurity, Cisco, EMC, and Linux.

 

In his downtime, Erich enjoys spending time with his wife and two daughters.

 

Wayne Lewis wears three hats: Cisco Academy Manager for the Pacific Center for Advanced Technology Training, NetAcad Contact for the Central Pacific Academy Support and Instructor Training Center, and Professor at Honolulu Community College. Okay . . . four hats: Wayne teaches calculus, linear algebra, and differential equations at the University of Hawaii at Manoa.

 

Honolulu CC has been an instructor training center for Cisco Academy since 1998, and its instructors are responsible for training many of the initial cohorts of Cisco Academy instructors in countries throughout Asia, Europe, and the Americas. Wayne has been involved in curriculum development and assessment for Cisco Academy since 1999.

 

Wayne spends his free time doing math (representation theory, algebraic geometry, and several complex variables) and watching marathon sessions of TV series with his family (their favorites to rewatch are South Park, The Office, Monty Python, and Lost).