CCIE Routing and Switching Official Exam Certification Guide

CCIE Routing and Switching Official Exam Certification Guide

3.62 (8 ratings by Goodreads)
By (author)  , By (author)  , By (author) 

List price: US$79.95

Currently unavailable

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks


Assessment, review, and practice for the CCIE Routing and Switching written exam 350-001 The official study guide helps you master all the topics on the CCIE Routing and Switching written exam, including:Bridging and LAN Switching IP addressing, IP services, and TCP/IP protocol details IP routing Quality of service (QoS) Frame Relay and Point-to-Point protocols IP multicast Security Enterprise wireless mobility General networking theoryCCIE Routing and Switching Official Exam Certification Guide, Second Edition, is a best of breed Cisco (R) exam study guide that focuses specifically on the objectives for the CCIE (R) Routing and Switching written exam. Senior instructor and best-selling author Wendell Odom shares preparation hints and test-taking tips, helping you identify areas of weakness and improve your routing and switching knowledge. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. CCIE Routing and Switching Official Exam Certification Guide, Second Edition, presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists and Foundation Summary tables make referencing easy and give you a quick refresher whenever you need it. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a module by module basis, presenting question-by-question remediation to the text. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this completely revised and updated second edition helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCIE Routing and Switching Official Exam Certification Guide, Second Edition, is part of a recommended learning path from Cisco Systems (R) that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit Companion CD-ROMThe CD-ROM contains an electronic copy of the book and more than 500 practice questions for the CCIE Routing and Switching exam, all available in study mode, test mode, and flash card format. This volume is part of the Exam Certification Guide Series from Cisco Press (R). Books in this series provide officially developed exam preparation materials that offer assessment, review, and practice to help Cisco Career Certification candidates identify weaknesses, concentrate their study efforts, and enhance their confidence as exam day nears.
show more

Product details

  • Mixed media product | 1104 pages
  • 190 x 238 x 62mm | 2,018.48g
  • Pearson Education (US)
  • Cisco Press
  • Indianapolis, United States
  • English
  • 2nd edition
  • 1587201410
  • 9781587201417
  • 2,545,245

Table of contents

IntroductionPart I Bridging and LAN SwitchingChapter 1 Ethernet Basics"Do I Know This Already?" QuizFoundation TopicsEthernet Layer 1: Wiring, Speed, and DuplexRJ-45 Pinouts and Category 5 WiringAuto-negotiation, Speed, and DuplexCSMA/CDCollision Domains and Switch BufferingBasic Switch Port ConfigurationEthernet Layer 2: Framing and AddressingTypes of Ethernet AddressesEthernet Address FormatsProtocol Types and the 802.3 Length FieldSwitching and Bridging LogicFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingChapter 2 Virtual LANs and VLAN Trunking"Do I Know This Already?" QuizFoundation TopicsVirtual LANsVLAN ConfigurationUsing VLAN Database Mode to Create VLANsUsing Configuration Mode to Put Interfaces into VLANsUsing Configuration Mode to Create VLANsPrivate VLANsVLAN Trunking ProtocolVTP Process and Revision NumbersVTP ConfigurationNormal-Range and Extended-Range VLANsStoring VLAN ConfigurationVLAN Trunking: ISL and 802.1QISL and 802.1Q ConceptsISL and 802.1Q ConfigurationAllowed, Active, and Pruned VLANsTrunk Configuration CompatibilityConfiguring Trunking on Routers802.1Q-in-Q TunnelingFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingChapter 3 Spanning Tree Protocol"Do I Know This Already?" QuizFoundation Topics802.1D Spanning Tree ProtocolChoosing Which Ports Forward: Choosing Root Ports and Designated PortsElecting a Root SwitchDetermining the Root PortDetermining the Designated PortConverging to a New STP TopologyTopology Change Notification and Updating the CAMTransitioning from Blocking to ForwardingPer-VLAN Spanning Tree and STP over TrunksSTP Configuration and AnalysisOptimizing Spanning TreePortFast, UplinkFast, and BackboneFastPortFastUplinkFastBackboneFastPortFast, UplinkFast, and BackboneFast ConfigurationPortChannelsLoad Balancing Across PortChannelsPortChannel Discovery and ConfigurationRapid Spanning Tree ProtocolMultiple Spanning Trees: IEEE 802.1sProtecting STPRoot Guard and BPDU Guard: Protecting Access PortsUDLD and Loop Guard: Protecting TrunksFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingPart II TCP/IPChapter 4 IP Addressing"Do I Know This Already?" QuizFoundation TopicsIP Addressing and SubnettingIP Addressing and Subnetting ReviewSubnetting a Classful Network NumberComments on Classless AddressingSubnetting MathDissecting the Component Parts of an IP AddressFinding Subnet Numbers and Valid Range of IP Addresses-BinaryDecimal Shortcuts to Find the Subnet Number and Valid Range of IP AddressesDetermining All Subnets of a Network-BinaryDetermining All Subnets of a Network-DecimalVLSM Subnet AllocationRoute Summarization ConceptsFinding Inclusive Summary Routes-BinaryFinding Inclusive Summary Routes-DecimalFinding Exclusive Summary Routes-BinaryCIDR, Private Addresses, and NATClassless Interdomain RoutingPrivate AddressingNetwork Address TranslationStatic NATDynamic NAT Without PATOverloading NAT with Port Address TranslationDynamic NAT and PAT ConfigurationIP Version 6IPv6 Address FormatsAggregatable Global Unicast AddressesSimple IPv6 ConfigurationIPv6 Addressing SummaryFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingChapter 5 IP Services"Do I Know This Already?" QuizFoundation TopicsICMPICMP UnreachableTime Exceeded ICMP MessageICMP RedirectARP, Proxy ARP, Reverse ARP, BOOTP, and DHCPARP and Proxy ARPRARP, BOOTP, and DHCPHSRP, VRRP, and GLBPNetwork Time ProtocolFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingChapter 6 TCP/IP Transport and Application Services"Do I Know This Already?" QuizFoundation TopicsTCP and UDPTCP Connections and Port NumbersTCP Error RecoveryTCP Dynamic WindowingTCP Header MiscellanyTCP/IP ApplicationsPassive and Active Mode FTPApplication Authentication and PrivacyNetwork Management and SNMPSNMP Protocol MessagesSNMP MIBsSNMP SecurityFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingPart III IP RoutingChapter 7 IP Forwarding (Routing)"Do I Know This Already?" QuizFoundation TopicsIP ForwardingProcess Switching, Fast Switching, and Cisco Express ForwardingBuilding Adjacency Information: ARP and Inverse ARPFrame Relay Inverse ARPStatic Configuration of Frame Relay Mapping InformationDisabling InARPClassless and Classful RoutingMultilayer SwitchingMLS LogicUsing Routed Ports and PortChannels with MLSMLS ConfigurationPolicy RoutingFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingChapter 8 RIP Version 2"Do I Know This Already?" QuizFoundation TopicsRIP Version 2 BasicsRIP Convergence and Loop PreventionConverged Steady-State OperationTriggered (Flash) Updates and Poisoned RoutesRIP Convergence When Routing Updates CeaseConvergence ExtrasRIP ConfigurationEnabling RIP and the Effects of AutosummarizationRIP Authentication ConfigurationRIP Next-Hop Feature and Split HorizonRIP Offset ListsRoute Filtering with Distribute Lists and Prefix ListsFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingChapter 9 EIGRP"Do I Know This Already?" QuizFoundation TopicsEIGRP Basics and Steady-State OperationHellos, Neighbors, and AdjacenciesEIGRP UpdatesThe EIGRP Topology TableEIGRP ConvergenceInput Events and Local ComputationGoing Active on a RouteStuck-in-ActiveLimiting Query ScopeEIGRP ConfigurationEIGRP Configuration ExampleEIGRP Load BalancingEIGRP Configuration Options That Are Similar to RIPFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingChapter 10 OSPF"Do I Know This Already?" QuizFoundation TopicsOSPF Database ExchangeOSPF Router IDsBecoming Neighbors, Exchanging Databases, and Becoming AdjacentBecoming Neighbors: The Hello ProcessFlooding LSA Headers to NeighborsRequesting, Getting, and Acknowledging LSAsDesignated Routers on LANsDesignated Router Optimization on LANsDR Election on LANsDesignated Routers on WANs and OSPF Network TypesCaveats Regarding OSPF Network Types over NBMA NetworksExample of OSPF Network Types and NBMASPF CalculationSteady-State OperationOSPF Design and LSAsOSPF Design TermsLSA Types and Network TypesLSA Types 1 and 2LSA Type 3 and Inter-Area CostsLSA Types 4 and 5, and External Route Types 1 and 2OSPF Design in Light of LSA TypesStubby AreasOSPF ConfigurationOSPF Costs and Clearing the OSPF ProcessAlternatives to the OSPF Network CommandOSPF FilteringFiltering Routes Using the distribute-listCommandOSPF ABR LSA Type 3 FilteringFiltering Type 3 LSAs with thearea range CommandVirtual Link ConfigurationConfiguring OSPF AuthenticationOSPF Stub Router ConfigurationFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingChapter 11 IGP Route Redistribution, Route Summarization, and Default Routing"Do I Know This Already?" QuizFoundation TopicsRoute Maps, Prefix Lists, and Administrative DistanceConfiguring Route Maps with theroute-mapCommandRoute Map matchCommands for Route RedistributionRoute Map setCommands for Route RedistributionIP Prefix ListsAdministrative DistanceRoute RedistributionThe Mechanics of the redistributeCommandRedistribution Using Default SettingsSetting Metrics, Metric Types, and TagsRedistributing a Subset of Routes Using a Route MapMutual Redistribution at Multiple RoutersPreventing Suboptimal Routes by Setting the Administrative DistancePreventing Suboptimal Routes by Using Route TagsUsing Metrics and Metric Types to Influence Redistributed RoutesRoute SummarizationEIGRP Route SummarizationOSPF Route SummarizationRIP Route SummarizationDefault RoutesUsing Static Routes to, with redistribute staticUsing the default-information originateCommandUsing the ip default-networkCommandUsing Route Summarization to Create Default RoutesFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingChapter 12 Fundamental BGP Operations"Do I Know This Already?" QuizFoundation TopicsBuilding BGP Neighbor RelationshipsInternal BGP NeighborsExternal BGP NeighborsChecks Before Becoming BGP NeighborsBGP Messages and Neighbor StatesBGP Message TypesPurposefully Resetting BGP Peer ConnectionsBuilding the BGP TableInjecting Routes/Prefixes into the BGP TableThe BGP network CommandRedistributing from an IGP, Static, or Connected RouteThe Impact of Auto-Summary on Redistributed Routes and the networkCommandManual Summaries and the AS_PATH Path AttributeAdding Default Routes to BGPThe ORIGIN Path AttributeAdvertising BGP Routes to NeighborsThe BGP Update MessageDetermining the Contents of UpdatesExample: Impact of the Decision Process and NEXT_HOP on BGP UpdatesSummary of Rules for Routes Advertised in BGP UpdatesBuilding the IP Routing TableAdding eBGP Routes to the IP Routing TableBackdoor RoutesAdding iBGP Routes to the IP Routing TableUsing Sync and Redistributing RoutesDisabling Sync and Using BGP on All Routers in an ASConfederationsConfiguring ConfederationsRoute ReflectorsFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingChapter 13 BGP Routing Policies"Do I Know This Already?" QuizFoundation TopicsRoute Filtering and Route SummarizationFiltering BGP Updates Based on NLRIRoute Map Rules for NLRI FilteringSoft ReconfigurationComparing BGP Prefix Lists, Distribute Lists, and Route MapsFiltering Subnets of a Summary Using the aggregate-addressCommandFiltering BGP Updates by Matching the AS_PATH PAThe BGP AS_PATH and AS_PATH Segment TypesUsing Regular Expressions to Match AS_PATHExample: Matching AS_PATHs Using AS_PATH FiltersMatching AS_SET and AS_CONFED_SEQBGP Path Attributes and the BGP Decision ProcessGeneric Terms and Characteristics of BGP PAsThe BGP Decision ProcessClarifications of the BGP Decision ProcessTwo Final Tiebreaker Steps in the BGP Decision ProcessAdding Multiple BGP Routes to the IP Routing TableMnemonics for Memorizing the Decision ProcessConfiguring BGP PoliciesBackground: BGP PAs and Features Used by Routing PoliciesStep 0: NEXT_HOP ReachableStep 1: Administrative WeightStep 2: Highest Local Preference (LOCAL_PREF)Step 3: Choose Between Locally Injected Routes Based on ORIGIN PAStep 4: Shortest AS_PATHRemoving Private ASNsAS_PATH Prepending and Route AggregationStep 5: Best ORIGIN PAStep 6: Smallest Multi-Exit DiscriminatorConfiguring MED: Single Adjacent ASConfiguring MED: Multiple Adjacent Autonomous SystemsThe Scope of MEDStep 7: Prefer Neighbor Type eBGP over iBGPStep 8: Smallest IGP Metric to the NEXT_HOPThe maximum-paths Command and BGP Decision Process TiebreakersStep 9: Lowest BGP Router ID of Advertising Router (with One Exception)Step 10: Lowest Neighbor IDThe BGP maximum-paths CommandBGP CommunitiesMatching COMMUNITY with Community ListsRemoving COMMUNITY ValuesFiltering NLRI Using Special COMMUNITY ValuesFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingPart IV Quality of ServiceChapter 14 Classification and Marking"Do I Know This Already?" QuizFoundation TopicsFields That Can Be Marked for QoS PurposesIP Precedence and DSCP ComparedDSCP Settings and TerminologyThe Class Selector PHB and DSCP ValuesThe Assured Forwarding PHB and DSCP ValuesThe Expedited Forwarding PHB and DSCP ValuesNon-IP Header Marking FieldsEthernet LAN Class of ServiceWAN Marking FieldsLocations for Marking and MatchingCisco Modular QoS CLIThe Mechanics of MQCClassification Using Class MapsUsing Multiple matchCommandsClassification Using NBARClassification and Marking ToolsClass-Based Marking (CB Marking) ConfigurationCB Marking ExampleCB Marking of CoS and DSCPNetwork-Based Application RecognitionCB Marking Design ChoicesMarking Using PolicersPolicy Routing for MarkingFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingChapter 15 Congestion Management and Avoidance"Do I Know This Already?" QuizFoundation TopicsCisco Router Queuing ConceptsSoftware Queues and Hardware QueuesQueuing on Interfaces Versus Subinterfaces and Virtual CircuitsComparing Queuing ToolsQueuing Tools: FIFO, PQ, CQ, WFQ, CBWFQ, and LLQFIFO QueuingPriority QueuingCustom QueuingWeighted Fair QueuingWFQ Scheduler: The ProcessWFQ Drop Policy, Number of Queues, and Queue LengthsTypes of WFQ QueuesWFQ ConfigurationClass-Based WFQ and Low-Latency QueuingCBWFQ Basic Features and ConfigurationDefining and Limiting CBWFQ BandwidthLow-Latency QueuingDefining and Limiting LLQ BandwidthLLQ with More Than One Priority QueueMiscellaneous CBWFQ/LLQ TopicsQueuing SummaryWeighted Random Early DetectionHow WRED Weights PacketsWRED ConfigurationLAN Switch Congestion Management and AvoidanceCisco 3550 Switch Egress QueuingCisco 3550 Congestion AvoidanceComparisons Between Cisco 3550 and 2950 SwitchesFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingChapter 16 Shaping and Policing"Do I Know This Already?" QuizFoundation TopicsTraffic-Shaping ConceptsShaping TerminologyShaping with an Excess BurstUnderlying Mechanics of ShapingTraffic-Shaping Adaptation on Frame Relay NetworksClass-Based Shaping ConfigurationTuning Shaping for Voice Using LLQ and a Small TcConfiguring Shaping by Bandwidth PercentCB Shaping to a Peak RateAdaptive ShapingFrame Relay Traffic Shaping ConfigurationFRTS Configuration Using the traffic-rateCommandSetting FRTS Parameters ExplicitlyFRTS Configuration Using LLQFRTS Adaptive ShapingPolicing Concepts and ConfigurationCB Policing ConceptsSingle-Rate, Two-Color Policing (One Bucket)Single-Rate, Three-Color Policer (Two Buckets)Two-Rate, Three-Color Policer (Two Buckets)Class-Based Policing ConfigurationSingle-Rate, Three-Color Policing of All TrafficPolicing a Subset of the TrafficCB Policing Defaults for Bc and BeConfiguring Dual-Rate PolicingMulti-Action PolicingPolicing by PercentageCommitted Access RateFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingPart V WANChapter 17 Synchronous Serial Links and Protocols"Do I Know This Already?" QuizFoundation TopicsSynchronous Serial LinksT1 Framing and EncodingT1 AlarmsCarrier Detect and Interface ResetsPoint-to-Point ProtocolPPP Link Control ProtocolBasic LCP/PPP ConfigurationMultilink PPPMLP Link Fragmentation and InterleavingPPP CompressionPPP Layer 2 Payload CompressionHeader CompressionFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingChapter 18 Frame Relay"Do I Know This Already?" QuizFoundation TopicsFrame Relay ConceptsFrame Relay Data Link Connection IdentifiersLocal Management InterfaceFrame Relay Headers and EncapsulationFrame Relay Congestion: DE, BECN, and FECNAdaptive Shaping, FECN, and BECNThe Discard Eligibility BitFrame Relay ConfigurationFrame Relay Configuration BasicsFrame Relay Payload CompressionFrame Relay FragmentationFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingPart VI IP MulticastChapter 19 Introduction to IP Multicasting"Do I Know This Already?" QuizFoundation TopicsWhy Do You Need Multicasting?Problems with Unicast and Broadcast MethodsHow Multicasting Provides a Scalable and Manageable SolutionMulticast IP AddressesMulticast Address Range and StructureWell-Known Multicast AddressesMulticast Addresses for Permanent GroupsMulticast Addresses for Source-Specific Multicast Applications and ProtocolsMulticast Addresses for GLOP AddressingMulticast Addresses for Private Multicast DomainsMulticast Addresses for Transient GroupsSummary of Multicast Address RangesMapping IP Multicast Addresses to MAC AddressesManaging Distribution of Multicast Traffic with IGMPJoining a GroupInternet Group Management ProtocolIGMP Version 1IGMPv1 Host Membership Query FunctionsIGMPv1 Host Membership Report FunctionsIGMPv1 Leave MechanismIGMPv1 QuerierIGMP Version 2IGMPv2 Leave Group and Group-Specific Query MessagesIGMPv2 QuerierIGMPv1 and IGMPv2 InteroperabilityIGMPv2 Host and IGMPv1 RoutersIGMPv1 Host and IGMPv2 RoutersIGMPv1 and IGMPv2 RoutersTimers Used in IGMPv1 and IGMPv2IGMP Version 3Comparison of IGMPv1, IGMPv2, and IGMPv3Multicast Listener Discovery ProtocolLAN Multicast OptimizationsCisco Group Management ProtocolIGMP SnoopingRouter-Port Group Management ProtocolFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingReferences in This ChapterChapter 20 IP Multicast Routing"Do I Know This Already?" QuizFoundation TopicsMulticast Routing BasicsOverview of Multicast Routing ProtocolsMulticast Forwarding Using Dense ModeReverse-Path-Forwarding CheckMulticast Forwarding Using Sparse ModeMulticast ScopingTTL ScopingAdministrative ScopingDense-Mode Routing ProtocolsOperation of Protocol Independent Multicast Dense ModeForming PIM Adjacencies Using PIM Hello MessagesSource-Based Distribution TreesPrune MessagePIM-DM: Reacting to a Failed LinkRules for PruningSteady-State Operation and the State Refresh MessageGraft MessageLAN-Specific Issues with PIM-DM and PIM-SMPrune OverrideAssert MessageDesignated RouterSummary of PIM-DM MessagesDistance Vector Multicast Routing ProtocolMulticast Open Shortest Path FirstSparse-Mode Routing ProtocolsOperation of Protocol Independent Multicast Sparse ModeSimilarities Between PIM-DM and PIM-SMSources Sending Packets to the Rendezvous PointJoining the Shared TreeCompletion of the Source Registration ProcessShared Distribution TreeSteady-State Operation by Continuing to Send JoinsExamining the RP's Multicast Routing TableShortest-Path Tree SwitchoverPruning from the Shared TreeDynamically Finding RPs and Using Redundant RPsDynamically Finding the RP Using Auto-RPDynamically Finding the RP Using BSRAnycast RP with MSDPSummary: Finding the RPBidirectional PIMComparison of PIM-DM and PIM-SMFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingPart VII SecurityChapter 21 Security"Do I Know This Already?" QuizFoundation TopicsRouter and Switch Device SecuritySimple Password Protection for the CLIBetter Protection of Enable and Username PasswordsUser Mode and Privileged Mode AAA AuthenticationUsing a Default Set of Authentication MethodsUsing Multiple Authentication MethodsGroups of AAA ServersOverriding the Defaults for Login SecurityPPP SecurityLayer 2 SecuritySwitch Security Best Practices for Unused and User PortsPort SecurityDynamic ARP InspectionDHCP SnoopingIP Source Guard802.1X Authentication Using EAPGeneral Layer 2 Security RecommendationsLayer 3 SecurityIP Access Control List ReviewACL Rule SummaryWildcard MasksGeneral Layer 3 Security ConsiderationsSmurf Attacks, Directed Broadcasts, and RPF ChecksInappropriate IP AddressesTCP SYN Flood, the Established Bit, and TCP InterceptFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingPart VIII Enterprise Wireless MobilityChapter 22 IEEE 802.11 Fundamentals"Do I Know This Already?" QuizFoundation Topics802.11 Physical Layer Standards802.11a802.11b802.11g802.11nComparison of 802.11 StandardsWireless System ConfigurationInfrastructure Mode ConfigurationAd Hoc Mode ConfigurationWireless Hardware ComponentsRadio CardsAccess PointsAntennasRepeatersBridgesRoutersRadio Frequency PeripheralsInfrastructure Mode OperationScanningPassive ScanningActive ScanningConnecting with a NetworkData TransferRoamingAd Hoc Mode OperationWireless Configuration ParametersSSIDRF ChannelsTransmit PowerData RatesPower-Save ModeRTS/CTSFragmentationRTS/CTS and Fragmentation SummaryWireless Medium AccessWireless SecurityWEPTKIPAESWPAOpen System AuthenticationShared Key AuthenticationVirtual Private NetworksComparing Wireless SecurityRF Signal ConceptsModulationRF Signal CharacteristicsGainSignal-to-Noise RatioSpread SpectrumOrthogonal Frequency Division MultiplexingFCC RulesRF InterferenceMultipathFoundation SummaryMemory BuildersDefinitionsFurther ReadingChapter 23 Wireless LAN Solutions"Do I Know This Already?" QuizFoundation TopicsCisco Structured Wireless-Aware NetworkWireless Domain ServicesIntrusion Detection SystemCisco SWAN HardwareCisco Wireless LAN HardwareCiscoWorks Wireless LAN Solution EngineAutomatic Access Point ConfigurationAssisted Site SurveysCentralized Firmware UpdatesDynamic GroupingVLAN ConfigurationMultiple Service Set Identifier SupportCustomizable ThresholdsFault StatusIntrusion Detection SystemSecurity Policy MonitoringSecure User InterfaceAir/RF Scanning and MonitoringSelf-Healing FunctionsReporting, Trending, Planning, and TroubleshootingApplying Wireless LANs in EnterprisesEnterprise SecurityVoice ServicesPublic Wireless LANsSmall Office and Home Wireless LANsFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsFurther ReadingPart IX OSI and Cisco Device BasicsChapter 24 Miscellaneous Networking Theory and Practices"Do I Know This Already?" QuizFoundation TopicsThe OSI and TCP/IP ModelsOSI LayersOSI Layering Concepts and BenefitsOSI TerminologyOSI Layer InteractionsRouter Operation MiscellanyCisco IOS Software Boot Sequences and the Configuration RegisterThe Configuration RegisterThe boot system CommandCLI Help FeaturesFoundation SummaryMemory BuildersFill in Key Tables from MemoryDefinitionsPart X AppendixesAppendix A Answers to the "Do I Know This Already?" QuizzesAppendix B CCIE Routing and Switching Exam Updates: Version 1.0Appendix C MPLSAppendix D Decimal to Binary Conversion TableGlossary Index
show more

About Wendell Odom

Wendell Odom, CCIE No. 1624, is a senior instructor with Skyline Advanced Technology Services (, where he teaches the QOS, CCIE, and CCNA (R) courses. Wendell has worked in the networking arena for 20 years, with jobs in pre- and post-sales technical consulting, teaching, and course development. Jim Geier is the founder of Wireless-Nets, Ltd., and the company's principal consultant. Jim provides expert analysis, design, and planning dealing with the development and deployment of wireless LANs. Naren Mehta, CCIE No. 9797, has more than eight years of technical instruction experience. He is responsible for designing and delivering Cisco certification preparation courses, with a focus on the CCIE Routing and Switching and Security written and lab exams.
show more

Rating details

8 ratings
3.62 out of 5 stars
5 12% (1)
4 38% (3)
3 50% (4)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X