close menu
Bookswagon-24x7 online bookstore
close menu
My Account
Home > Computing and Information Technology > Computer networking and communications > Scaling Networks Companion Guide: (Companion Guide)
67%
Scaling Networks Companion Guide: (Companion Guide)

Scaling Networks Companion Guide: (Companion Guide)

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

This is the only Cisco-authorized companion guide to the official Cisco Networking Academy Scaling Networks course for the CCNA Routing and Switching curriculum. An indispensable resource for hundreds of thousands of Cisco Networking Academy students worldwide, this portable desk reference is ideal for anytime/anywhere take-home study and reference. Fully aligned to the online course chapters, it offers additional book-based pedagogy to reinforce key concepts, enhance student comprehension, and promote retention. Using it, students can focus scarce study time, organize review for quizzes and exams, and get the day-to-day reference answers they're looking for.

Table of Contents:
Introduction xx Chapter 1 Introduction to Scaling Networks 1 Objectives 1 Key Terms 1 Introduction (1.0.1.1) 3 Implementing a Network Design (1.1) 3 Hierarchical Network Design (1.1.1) 3 The Need to Scale the Network (1.1.1.1) 3 Enterprise Business Devices (1.1.1.2) 5 Hierarchical Network Design (1.1.1.3) 6 Cisco Enterprise Architecture (1.1.1.4) 7 Failure Domains (1.1.1.5) 9 Expanding the Network (1.1.2) 11 Design for Scalability (1.1.2.1) 11 Planning for Redundancy (1.1.2.2) 12 Increasing Bandwidth (1.1.2.3) 13 Expanding the Access Layer (1.1.2.4) 14 Fine-tuning Routing Protocols (1.1.2.5) 15 Selecting Network Devices (1.2) 18 Switch Hardware (1.2.1) 18 Switch Platforms (1.2.1.1) 18 Port Density (1.2.1.2) 21 Forwarding Rates (1.2.1.3) 22 Power over Ethernet (1.2.1.4) 23 Multilayer Switching (1.2.1.5) 25 Router Hardware (1.2.2) 26 Router Requirements (1.2.2.1) 26 Cisco Routers (1.2.2.2) 28 Router Hardware (1.2.2.3) 29 Managing Devices (1.2.3) 30 Managing IOS Files and Licensing (1.2.3.1) 30 In-Band Versus Out-of-Band Management (1.2.3.2) 30 Basic Router CLI Commands (1.2.3.3) 31 Basic Router show Commands (1.2.3.4) 34 Basic Switch CLI Commands (1.2.3.5) 39 Basic Switch show Commands (1.2.3.6) 40 Summary (1.3) 44 Practice 45 Class Activities 45 Labs 45 Packet Tracer Activities 45 Check Your Understanding Questions 46 Chapter 2 LAN Redundancy 49 Objectives 49 Key Terms 49 Introduction (2.0.1.1) 51 Spanning Tree Concepts (2.1) 52 Purpose of Spanning Tree (2.1.1) 52 Redundancy at OSI Layers 1 and 2 (2.1.1.1) 52 Issues with Layer 1 Redundancy: MAC Database Instability (2.1.1.2) 54 Issues with Layer 1 Redundancy: Broadcast Storms (2.1.1.3) 56 Issues with Layer 1 Redundancy: Duplicate Unicast Frames (2.1.1.4) 57 STP Operation (2.1.2) 59 Spanning Tree Algorithm: Introduction (2.1.2.1) 59 Spanning Tree Algorithm: Port Roles (2.1.2.2) 61 Spanning Tree Algorithm: Root Bridge (2.1.2.3) 63 Spanning Tree Algorithm: Path Cost (2.1.2.4) 64 802.1D BPDU Frame Format (2.1.2.5) 67 BPDU Propagation and Process (2.1.2.6) 68 Extended System ID (2.1.2.7) 74 Varieties of Spanning Tree Protocols (2.2) 77 Overview (2.2.1) 77 List of Spanning Tree Protocols (2.2.1.1) 78 Characteristics of the Spanning Tree Protocols (2.2.1.2) 79 PVST+ (2.2.2) 80 Overview of PVST+ (2.2.2.1) 80 Port States and PVST+ Operation (2.2.2.2) 82 Extended System ID and PVST+ Operation (2.2.2.3) 83 Rapid PVST+ (2.2.3) 84 Overview of Rapid PVST+ (2.2.3.1) 84 RSTP BPDU (2.2.3.2) 86 Edge Ports (2.2.3.3) 87 Link Types (2.2.3.4) 88 Spanning Tree Configuration (2.3) 90 PVST+ Configuration (2.3.1) 90 Catalyst 2960 Default Configuration (2.3.1.1) 90 Configuring and Verifying the Bridge ID (2.3.1.2) 91 PortFast and BPDU Guard (2.3.1.3) 93 PVST+ Load Balancing (2.3.1.4) 95 Rapid PVST+ Configuration (2.3.2) 98 Spanning Tree Mode (2.3.2.1) 98 STP Configuration Issues (2.3.3) 101 Analyzing the STP Topology (2.3.3.1) 101 Expected Topology Versus Actual Topology (2.3.3.2) 102 Overview of Spanning Tree Status (2.3.3.3) 102 Spanning Tree Failure Consequences (2.3.3.4) 103 Repairing a Spanning Tree Problem (2.3.3.5) 105 First Hop Redundancy Protocols (2.4) 105 Concept of First Hop Redundancy Protocols (2.4.1) 106 Default Gateway Limitations (2.4.1.1) 106 Router Redundancy (2.4.1.2) 107 Steps for Router Failover (2.4.1.3) 108 Varieties of First Hop Redundancy Protocols (2.4.2) 109 First Hop Redundancy Protocols (2.4.2.1) 109 FHRP Verification (2.4.3) 110 HSRP Verification (2.4.3.1) 110 GLBP Verification (2.4.3.2) 112 Syntax Checker – HSRP and GLBP (2.4.3.3) 114 Summary (2.5) 115 Practice 116 Class Activities 116 Labs 116 Packet Tracer Activities 116 Check Your Understanding Questions 117 Chapter 3 LAN Aggregation 121 Objectives 121 Key Terms 121 Introduction (3.0.1.1) 122 Link Aggregation Concepts (3.1) 122 Link Aggregation (3.1.1) 123 Introduction to Link Aggregation (3.1.1.1) 123 Advantages of EtherChannel (3.1.1.2) 124 EtherChannel Operation (3.1.2) 125 Implementation Restrictions (3.1.2.1) 125 Port Aggregation Protocol (3.1.2.2) 126 Link Aggregation Control Protocol (3.1.2.3) 128 Link Aggregation Configuration (3.2) 130 Configuring EtherChannel (3.2.1) 130 Configuration Guidelines (3.2.1.1) 130 Configuring Interfaces (3.2.1.2) 131 Verifying and Troubleshooting EtherChannel (3.2.2) 133 Verifying EtherChannel (3.2.2.1) 133 Troubleshooting EtherChannel (3.2.2.2) 135 Summary (3.3) 139 Practice 140 Class Activities 140 Labs 140 Packet Tracer Activities 140 Check Your Understanding Questions 141 Chapter 4 Wireless LANs 145 Objectives 145 Key Terms 145 Introduction (4.0.1.1) 147 Wireless Concepts (4.1) 147 Introduction to Wireless (4.1.1) 147 Supporting Mobility (4.1.1.1) 148 Benefits of Wireless (4.1.1.2) 148 Wireless Technologies (4.1.1.3) 149 Radio Frequencies (4.1.1.4) 150 802.11 Standards (4.1.1.5) 151 Wi-Fi Certification (4.1.1.6) 153 Comparing WLANs to a LAN (4.1.1.7) 154 Components of WLANs (4.1.2) 156 Wireless NICs (4.1.2.1) 156 Wireless Home Router (4.1.2.2) 157 Business Wireless Solutions (4.1.2.3) 159 Wireless Access Points (4.1.2.4) 160 Small Wireless Deployment Solutions (4.1.2.5) 162 Large Wireless Deployment Solutions (4.1.2.6, 4.1.2.7) 165 Wireless Antennas (4.1.2.8) 168 802.11 WLAN Topologies (4.1.3) 170 802.11 Wireless Topology Modes (4.1.3.1) 170 Ad Hoc Mode (4.1.3.2) 170 Infrastructure Mode (4.1.3.3) 171 Wireless LAN Operations (4.2) 173 802.11 Frame Structure (4.2.1) 173 Wireless 802.11 Frame (4.2.1.1) 173 Frame Control Field (4.2.1.2) 175 Wireless Frame Type (4.2.1.3) 177 Management Frames (4.2.1.4) 177 Control Frames (4.2.1.5) 180 Wireless Operation (4.2.2) 181 Carrier Sense Multiple Access with Collision Avoidance (4.2.2.1) 181 Wireless Clients and Access Point Association (4.2.2.2) 183 Association Parameters (4.2.2.3) 183 Discovering APs (4.2.2.4) 187 Authentication (4.2.2.5) 189 Channel Management (4.2.3) 191 Frequency Channel Saturation (4.2.3.1) 191 Selecting Channels (4.2.3.2) 193 Planning a WLAN Deployment (4.2.3.3) 196 Wireless LAN Security (4.3) 198 WLAN Threats (4.3.1) 198 Securing Wireless (4.3.1.1) 198 DoS Attack (4.3.1.2) 199 Management Frame DoS Attacks (4.3.1.3) 200 Rogue Access Points (4.3.1.4) 202 Man-in-the-Middle Attack (4.3.1.5) 203 Securing WLANs (4.3.2) 205 Wireless Security Overview (4.3.2.1) 205 Shared Key Authentication Methods (4.3.2.2) 206 Encryption Methods (4.3.2.3) 208 Authenticating a Home User (4.3.2.4) 208 Authentication in the Enterprise (4.3.2.5) 210 Wireless LAN Configuration (4.4) 211 Configure a Wireless Router (4.4.1) 211 Configuring a Wireless Router (4.4.1.1) 211 Setting Up and Installing Initial Linksys EA6500 (4.4.1.2) 213 Configuring the Linksys Smart Wi-Fi Home Page (4.4.1.3) 217 Smart Wi-Fi Settings (4.4.1.4) 218 Smart Wi-Fi Tools (4.4.1.5) 220 Backing Up a Configuration (4.4.1.6) 224 Configuring Wireless Clients (4.4.2) 225 Connecting Wireless Clients (4.4.2.1) 225 Troubleshoot WLAN Issues (4.4.3) 226 Troubleshooting Approaches (4.4.3.1) 226 Wireless Client Not Connecting (4.4.3.2) 227 Troubleshooting When the Network Is Slow (4.4.3.3) 229 Updating Firmware (4.4.3.4) 230 Summary (4.5) 232 Practice 233 Class Activities 233 Labs 233 Packet Tracer Activities 234 Check Your Understanding Questions 234 Chapter 5 Adjust and Troubleshoot Single-Area OSPF 237 Objectives 237 Key Terms 237 Introduction (5.0.1.1) 238 Advanced Single-Area OSPF Configurations (5.1) 238 Routing in the Distribution and Core Layers (5.1.1) 238 Routing Versus Switching (5.1.1.1) 238 Static Routing (5.1.1.2) 239 Dynamic Routing Protocols (5.1.1.3) 240 Open Shortest Path First (5.1.1.4) 241 Configuring Single-Area OSPF (5.1.1.5) 242 Verifying Single-Area OSPF (5.1.1.6) 244 Configuring Single-Area OSPFv3 (5.1.1.7) 247 Verifying Single-Area OSPFv3 (5.1.1.8) 249 OSPF in Multiaccess Networks (5.1.2) 251 OSPF Network Types (5.1.2.1) 251 Challenges in Multiaccess Networks (5.1.2.2) 253 OSPF Designated Router (5.1.2.3) 255 Verifying DR/BDR Roles (5.1.2.4) 256 Verifying DR/BDR Adjacencies (5.1.2.5) 259 Default DR/BDR Election Process (5.1.2.6) 261 DR/BDR Election Process (5.1.2.7) 262 The OSPF Priority (5.1.2.8) 265 Changing the OSPF Priority (5.1.2.9) 265 Default Route Propagation (5.1.3) 268 Propagating a Default Static Route in OSPFv2 (5.1.3.1) 268 Verifying the Propagated Default Route (5.1.3.2) 269 Propagating a Default Static Route in OSPFv3 (5.1.3.3) 271 Verifying the Propagated IPv6 Default Route (5.1.3.4) 272 Fine-Tuning OSPF Interfaces (5.1.4) 273 OSPF Hello and Dead Intervals (5.1.4.1) 273 Modifying OSPFv2 Intervals (5.1.4.2) 275 Modifying OSPFv3 Intervals (5.1.4.3) 277 Secure OSPF (5.1.5) 279 Routers Are Targets (5.1.5.1) 279 Secure Routing Updates (5.1.5.2) 280 MD5 Authentication (5.1.5.3) 281 Configuring OSPF MD5 Authentication (5.1.5.4) 282 OSPF MD5 Authentication Example (5.1.5.5) 283 Verifying OSPF MD5 Authentication (5.1.5.6) 284 Troubleshooting Single-Area OSPF Implementations (5.2) 286 Components of Troubleshooting Single-Area OSPF (5.2.1) 286 Overview (5.2.1.1) 286 OSPF States (5.2.1.2) 287 OSPF Troubleshooting Commands (5.2.1.3) 288 Components of Troubleshooting OSPF (5.2.1.4) 292 Troubleshoot Single-Area OSPFv2 Routing Issues (5.2.2) 293 Troubleshooting Neighbor Issues (5.2.2.1) 293 Troubleshooting OSPF Routing Table Issues (5.2.2.2) 297 Troubleshoot Single-Area OSPFv3 Routing Issues (5.2.3) 299 OSPFv3 Troubleshooting Commands (5.2.3.1) 299 Troubleshooting OSPFv3 (5.2.3.2) 302 Summary (5.3) 306 Practice 308 Class Activities 308 Labs 308 Packet Tracer Activities 308 Check Your Understanding Questions 309 Chapter 6 Multiarea OSPF 315 Objectives 315 Key Terms 315 Introduction (6.0.1.1) 316 Multiarea OSPF Operation (6.1) 316 Why Multiarea OSPF? (6.1.1) 316 Single-Area OSPF (6.1.1.1) 316 Multiarea OSPF (6.1.1.2) 317 OSPF Two-Layer Area Hierarchy (6.1.1.3) 319 Types of OSPF Routers (6.1.1.4) 320 Multiarea OSPF LSA Operation (6.1.2) 321 OSPF LSA Types (6.1.2.1) 321 OSPF LSA Type 1 (6.1.2.2) 322 OSPF LSA Type 2 (6.1.2.3) 323 OSPF LSA Type 3 (6.1.2.4) 324 OSPF LSA Type 4 (6.1.2.5) 325 OSPF LSA Type 5 (6.1.2.6) 326 OSPF Routing Table and Types of Routes (6.1.3) 326 OSPF Routing Table Entries (6.1.3.1) 327 OSPF Route Calculation (6.1.3.2) 328 Configuring Multiarea OSPF (6.2) 329 Configuring Multiarea OSPFv2 and OSPFv3 (6.2.1) 329 Implementing Multiarea OSPF (6.2.1.1) 329 Configuring Multiarea OSPF (6.2.1.2) 330 Configuring Multiarea OSPFv3 (6.2.1.3) 332 OSPF Route Summarization (6.2.2) 334 OSPF Route Summarization (6.2.2.1) 334 Interarea and External Route Summarization (6.2.2.2) 336 Interarea Route Summarization (6.2.2.3) 338 Calculating the Summary Route (6.2.2.4) 339 Configuring Interarea Route Summarization (6.2.2.5) 340 Verifying Multiarea OSPF (6.2.3) 342 Verifying Multiarea OSPF (6.2.3.1) 342 Verify General Multiarea OSPF Settings (6.2.3.2) 343 Verify the OSPF Routes (6.2.3.3) 345 Verify the Multiarea OSPF LSDB (6.2.3.4) 346 Verify Multiarea OSPFv3 (6.2.3.5) 349 Summary (6.3) 354 Practice 356 Class Activities 356 Labs 356 Packet Tracer Activities 356 Check Your Understanding Questions 356 Chapter 7 EIGRP 361 Objectives 361 Key Terms 361 Introduction (7.0.1.1) 363 Characteristics of EIGRP (7.1) 363 Basic Features of EIGRP (7.1.1) 363 Features of EIGRP (7.1.1.1) 364 Protocol-Dependent Modules (7.1.1.2) 365 Reliable Transport Protocol (7.1.1.3) 367 Authentication (7.1.1.4) 368 Types of EIGRP Packets (7.1.2) 368 EIGRP Packet Types (7.1.2.1) 368 EIGRP Hello Packets (7.1.2.2) 370 EIGRP Update and Acknowledgment Packets (7.1.2.3) 370 EIGRP Query and Reply Packets (7.1.2.4) 372 EIGRP Messages (7.1.3) 373 Encapsulating EIGRP Messages (7.1.3.1) 373 EIGRP Packet Header and TLV (7.1.3.2) 374 Configuring EIGRP for IPv4 (7.2) 377 Configuring EIGRP with IPv4 (7.2.1) 377 EIGRP Network Topology (7.2.1.1) 377 Autonomous System Numbers (7.2.1.2) 379 The Router EIGRP Command (7.2.1.3) 381 EIGRP Router ID (7.2.1.4) 382 Configuring the EIGRP Router ID (7.2.1.5) 384 The network Command (7.2.1.6) 385 The network Command and Wildcard Mask (7.2.1.7) 387 Passive Interface (7.2.1.8) 389 Verifying EIGRP with IPv4 (7.2.2) 392 Verifying EIGRP: Examining Neighbors (7.2.2.1) 392 Verifying EIGRP: show ip protocols Command (7.2.2.2) 393 Verifying EIGRP: Examine the IPv4 Routing Table (7.2.2.3) 396 Operation of EIGRP (7.3) 399 EIGRP Initial Route Discovery (7.3.1) 399 EIGRP Neighbor Adjacency (7.3.1.1) 399 EIGRP Topology Table (7.3.1.2) 400 EIGRP Convergence (7.3.1.3) 401 Metrics (7.3.2) 402 EIGRP Composite Metric (7.3.2.1) 402 Examining Interface Values (7.3.2.2) 405 Bandwidth Metric (7.3.2.3) 406 Delay Metric (7.3.2.4) 408 How to Calculate the EIGRP Metric (7.3.2.5) 409 Calculating the EIGRP Metric (7.3.2.6) 410 DUAL and the Topology Table (7.3.3) 413 DUAL Concepts (7.3.3.1) 413 Introduction to DUAL (7.3.3.2) 413 Successor and Feasible Distance (7.3.3.3) 414 Feasible Successors, Feasibility Condition, and Reported Distance (7.3.3.4) 415 Topology Table: show ip eigrp topology Command (7.3.3.5) 417 Topology Table: show ip eigrp topology Command (Cont.) (7.3.3.6) 418 Topology Table: No Feasible Successor (7.3.3.7) 420 DUAL and Convergence (7.3.4) 422 DUAL Finite State Machine (FSM) (7.3.4.1) 423 DUAL: Feasible Successor (7.3.4.2) 424 DUAL: No Feasible Successor (7.3.4.3) 426 Configuring EIGRP for IPv6 (7.4) 429 EIGRP for IPv4 Versus IPv6 (7.4.1) 429 EIGRP for IPv6 (7.4.1.1) 429 Comparing EIGRP for IPv4 and IPv6 (7.4.1.2) 430 IPv6 Link-Local Addresses (7.4.1.3) 432 Configuring EIGRP for IPv6 (7.4.2) 432 EIGRP for IPv6 Network Topology (7.4.2.1) 432 Configuring IPv6 Link-Local Addresses (7.4.2.2) 434 Configuring the EIGRP for IPv6 Routing Process (7.4.2.3) 436 The ipv6 eigrp Interface Command (7.4.2.4) 437 Verifying EIGRP for IPv6 (7.4.3) 440 Verifying EIGRP for IPv6: Examining Neighbors (7.4.3.1) 440 Verifying EIGRP for IPv6: show ipv6 protocols Command (7.4.3.2) 441 Verifying EIGRP for IPv6: Examine the IPv6 Routing Table (7.4.3.3) 442 Summary (7.5) 445 Practice 446 Class Activities 446 Labs 447 Packet Tracer Activities 447 Check Your Understanding Questions 447 Chapter 8 EIGRP Advanced Configurations and Troubleshooting 453 Objectives 453 Key Terms 453 Introduction (8.0.1.1) 454 Advanced EIGRP Configurations (8.1) 454 Automatic Summarization (8.1.1) 455 Network Topology (8.1.1.1) 455 EIGRP Automatic Summarization (8.1.1.2) 457 Configuring EIGRP Automatic Summarization (8.1.1.3) 459 Verifying Auto-Summary: show ip protocols (8.1.1.4) 460 Verifying Auto-Summary: Topology Table (8.1.1.5) 462 Verifying Auto-Summary: Routing Table (8.1.1.6) 464 Summary Route (8.1.1.7) 465 Summary Route (Cont.) (8.1.1.8) 466 Manual Summarization (8.1.2) 468 Manual Summary Routes (8.1.2.1) 468 Configuring EIGRP Manual Summary Routes (8.1.2.2) 470 Verifying Manual Summary Routes (8.1.2.3) 471 EIGRP for IPv6: Manual Summary Routes (8.1.2.4) 472 Default Route Propagation (8.1.3) 474 Propagating a Default Static Route (8.1.3.1) 474 Verifying the Propagated Default Route (8.1.3.2) 476 EIGRP for IPv6: Default Route (8.1.3.3) 477 Fine-Tuning EIGRP Interfaces (8.1.4) 478 EIGRP Bandwidth Utilization (8.1.4.1) 479 Hello and Hold Timers (8.1.4.2) 480 Load-Balancing IPv4 (8.1.4.3) 482 Load-Balancing IPv6 (8.1.4.4) 484 Secure EIGRP (8.1.5) 486 Routing Protocol Authentication Overview (8.1.5.1) 486 Configuring EIGRP with MD5 Authentication (8.1.5.2) 488 EIGRP Authentication Example (8.1.5.3) 489 Verify Authentication (8.1.5.4) 491 Troubleshoot EIGRP (8.2) 493 Components of Troubleshooting EIGRP (8.2.1) 493 Basic EIGRP Troubleshooting Commands (8.2.1.1) 493 Components (8.2.1.2) 495 Troubleshoot EIGRP Neighbor Issues (8.2.2) 496 Layer 3 Connectivity (8.2.2.1) 496 EIGRP Parameters (8.2.2.2) 497 EIGRP Interfaces (8.2.2.3) 498 Troubleshoot EIGRP Routing Table Issues (8.2.3) 500 Passive Interface (8.2.3.1) 500 Missing Network Statement (8.2.3.2) 502 Automatic Summarization (8.2.3.3) 504 Summary (8.3) 509 Practice 511 Class Activities 511 Labs 511 Packet Tracer Activities 511 Check Your Understanding Questions 512 Chapter 9 IOS Images and Licensing 517 Objectives 517 Key Terms 517 Introduction (9.0.1.1) 518 Managing IOS System Files (9.1) 518 Naming Conventions (9.1.1) 519 Cisco IOS Software Release Families and Trains (9.1.1.1) 519 Cisco IOS Release 12.4 Mainline and T Trains (9.1.1.2) 519 Cisco IOS Release 12.4 Mainline and T Numbering (9.1.1.3) 521 Cisco IOS Release 12.4 System Image Packaging (9.1.1.4) 522 Cisco IOS Release 15.0 M and T Trains (9.1.1.5) 523 Cisco IOS Release 15 Train Numbering (9.1.1.6) 525 IOS Release 15 System Image Packaging (9.1.1.7) 526 IOS Image Filenames (9.1.1.8) 528 Managing Cisco IOS Images (9.1.2) 531 TFTP Servers as a Backup Location (9.1.2.1) 531 Creating a Cisco IOS Image Backup (9.1.2.2) 531 Copying a Cisco IOS Image (9.1.2.3) 533 Boot System (9.1.2.4) 534 IOS Licensing (9.2) 536 Software Licensing (9.2.1) 536 Licensing Overview (9.2.1.1) 536 Licensing Process (9.2.1.2) 538 Step 1. Purchase the Software Package or Feature to Install (9.2.1.3) 539 Step 2. Obtain a License (9.2.1.4) 539 Step 3. Install the License (9.2.1.5) 541 License Verification and Management (9.2.2) 542 License Verification (9.2.2.1) 542 Activate an Evaluation Right-To-Use License (9.2.2.2) 544 Back Up the License (9.2.2.3) 545 Uninstall the License (9.2.2.4) 546 Summary (9.3) 548 Practice 551 Class Activities 551 Packet Tracer Activities 551 Check Your Understanding Questions 551 Appendix A Answers to the “Check Your Understanding” Questions 555 Glossary 569 TOC, 9781587133282, 2/28/2014


Best Sellers



Product Details
  • ISBN-13: 9781587133282
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Depth: 32
  • Language: English
  • Returnable: N
  • Spine Width: 32 mm
  • Width: 216 mm
  • ISBN-10: 1587133288
  • Publisher Date: 10 Apr 2014
  • Binding: Hardback
  • Height: 240 mm
  • No of Pages: 640
  • Series Title: Companion Guide
  • Weight: 1340 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Scaling Networks Companion Guide: (Companion Guide)
Pearson Education (US) -
Scaling Networks Companion Guide: (Companion Guide)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Scaling Networks Companion Guide: (Companion Guide)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals



    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA