Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
13Activity

Table Of Contents

Benefits of a Hierarchical Network
Performance
PoE and Layer 3 Functionality
Access Layer Switch Features
Distribution Layer Switch Features
Core Layer Switch Features
CSMA/CD
Ethernet Communications
Duplex Settings
Switch Port Settings
MAC Addressing and Switch MAC Address Tables
Bandwidth and Throughput
Collision Domains
Broadcast Domains
Network Latency
Network Congestion
Controlling Network Latency
Removing Bottlenecks
Symmetric and Asymmetric Switching
Memory Buffering
Layer 2 and Layer 3 Switching
The Command Line Interface Modes
The Command History Buffer
Switch boot sequence
Basic switch configuration
Verifying switch configuration
Back up and Restore Switch Configurations
Clearing Configuration Information
Configure Console Access
Configure EXEC Mode Passwords
Configure a Login Banner/MOTD
Configure Telnet and SSH
Common security attacks
Configuring port security
Disable Unused Ports
VLAN Details
Controlling broadcast domains with VLANs
Controlling Broadcast Domains with Switches and Routers
Controlling Broadcast Domains with VLANs and Layer 3 Forwarding
802.1Q Frame Tagging
Trunking operation
Trunking modes
Configure VLAN
Configure trunk
The VLAN Management Challenge
VTP Components
Default VTP configuration
VTP Versions
VTP Domains
VTP advertising
VTP Advertisements
VTP modes
VTP pruning
Incorrect Revision Number
Issues with redundancy
Real world redundancy issues
STP Algorithm
STP BDU
Port roles
STP port states and BDU timers
Electing a Root Bridge
Electing Root Ports
Electing Designated Ports and Non-Designated Ports
STP Topology Change Notification Process
RSTP
Configuring rapid-PVST+
Interfaces and sub interfaces
Comparing a WLAN to a LAN
Wi-Fi Certification
Wireless NICs
Wireless Access Points
Wireless Routers
802.11 Topologies
Client and Access Point Association
Unauthorized Access
Wireless security protocols
Controlling Access to the Wireless LAN
Basic setup
Configuring Basic Wireless Settings
Configuring Security
0 of .
Results for:
No results containing your search query
P. 1
CCNA 3 Sam en Vatting

CCNA 3 Sam en Vatting

Ratings: (0)|Views: 3,440 |Likes:
Published by Dieter Lauwereys

More info:

Published by: Dieter Lauwereys on Jun 06, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/09/2013

pdf

text

original

You're Reading a Free Preview
Pages 4 to 47 are not shown in this preview.
You're Reading a Free Preview
Pages 51 to 63 are not shown in this preview.

Activity (13)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Peter Figueroa liked this
Md Arif liked this
Devon Kelleher liked this
Lwando Qumba liked this
Josea Korir liked this
Jc Villanueva liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->