BN.com Gift Guide

Performance and Fault Management

Overview

A comprehensive guide for designing and implementing effective strategies for network performance and management

  • Design and implement performance and fault monitoring that will measure and report the effectiveness of your Cisco network
  • Generate reports and alerts that provide network information and status
  • Learn to navigate Cisco's ...
See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (15) from $1.99   
  • New (4) from $6.63   
  • Used (11) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$6.63
Seller since 2008

Feedback rating:

(534)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
1578701805 Brand NEW Book - Moderate shelf-wear, including lightly bumped corners ~ all books carefully examined & well packaged

Ships from: Waltham, MA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$6.63
Seller since 2005

Feedback rating:

(219)

Condition: New
Hardcover New 1578701805 Brand NEW Book-Moderate shelf-wear, including lightly bumped corners ~ all books carefully examined & well packaged.

Ships from: Waltham, MA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$18.00
Seller since 2005

Feedback rating:

(228)

Condition: New
New (3199)Hardcover, CISCO Press, 1999; Great condition!

Ships from: Bethesda, MD

Usually ships in 1-2 business days

  • Canadian
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$37.43
Seller since 2014

Feedback rating:

(322)

Condition: New
Brand New Item.

Ships from: Chatham, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

A comprehensive guide for designing and implementing effective strategies for network performance and management

  • Design and implement performance and fault monitoring that will measure and report the effectiveness of your Cisco network
  • Generate reports and alerts that provide network information and status
  • Learn to navigate Cisco's documentation and MIBs to determine which elements of a specific technology you should manage
  • Study the key aspects of systems and VLAN management of Cisco devices
  • Discover best practices and related configurations for implementing network management on Cisco routers and switches

Performance and Fault Management is a comprehensive guide to designing and implementing effective strategies for monitoring performance levels and correctng problems in Cisco networks. It provides an overview of router and LAN switch operations to help you understand how to manage such devices, as well as guidance on the essential MIBs, traps, syslog messages, and show commands for managing Cisco routers and switches.

Written by a team of network management experts, this book details how to implement the practice of network management through documentation, process reviews, and network baselining. It explains various management commands, data, protocols, and resources in Cisco routers and switches. With this book, you will discover how to achieve optimum performance and fault management results on your Cisco network.

Read More Show Less

Product Details

  • ISBN-13: 9781578701803
  • Publisher: Pearson Education
  • Publication date: 6/20/2000
  • Series: Networking Technology Series
  • Pages: 608
  • Product dimensions: 7.65 (w) x 9.45 (h) x 1.68 (d)

Meet the Author


Paul L. Della Maggiora, CCIE #1522, is a Technical Marketing Engineer for Cisco's Performance Design and Verification Center. With more than 10 years experience in the networking industry, he has served as Escalation Engineer and NMS team lead for the TaC and Product Marketing Engineer since joining Cisco in 1994.

Christopher E. Elliott, CCIE #2018, has 25 years of experience in the networking industry, starting on the aRPaNET. He currently works for the Cisco Systems TaC. For the last eight years, he has concentrated on network management, including writing network management applications containing a distributed SNMP polling system.

Robert L. Pavonc, Jr., CCIE #1265, is a Network auditor and Tools Consultant on the Net Tools Team within Cisco's Customer advocacy organization. With more than 10 years of experience, he has dealt with everything from configuring analog modems to troubleshooting complex customer IP networks.

Kent J. Phelps, CCIE #2149, has more than 15 years of experience with information systems and communication networks. With Cisco Systems since 1996, he has concentrated for the past six years on network management and analysis.

James M. Thompson, CCIE #1758, has more than 20 years of experience in data and communications networking-from working with the aRPaNET and MILNET through supporting networks with more than 10,000 routers. He is currently a High availability Network Consultant with Network Supported accounts at Cisco Systems.

Read More Show Less

Read an Excerpt


Chapter 1: Conducting a Network audit

You bought this book to find out which management data to collect from the network, so why is the first chapter about audits and documentation? Simply put: You can't measure performance and watch for faults effectively without understanding where everything is and how it's connected. No matter how sophisticated the tools you purchase or build may be, the measures and alerts mean nothing without understanding how the network works.

Effective network management begins with a well-designed network. Unfortunately, most people do not have this luxury; if they do have network access, they usually cannot redesign the network to improve their ability to manage the infrastructure. aside from simplifying the management, starting with good network design or improving existing network design facilitates simpler and quicker resolution of network problems.

In order to implement effective network management, you must begin by learning and documenting the network as it currently exists. This includes documenting the physical and logical makeup of the network and its components, the people involved and their responsibilities, and the processes in place (if any) to enhance and maintain the network. These are the steps that make up a network audit. This chapter describes the primary tasks that are useful for learning and documenting how the servers, network devices, and users are connected. By learning and documenting the physical connectivity and logical configuration of your network, you will simplify the troubleshooting process when problems arise. The resultant information provides the foundation and integrity necessary to proceed with thecreation and seeding of the knowledge base described in Chapter 3, "Developing the Network Knowledge Base."

although not an exhaustive study, this chapter covers the following topics:

  • The purpose of network audits
  • Why documentation is important
  • Conducting a physical inventory audit
  • Conducting a connectivity audit
  • Conducting a process and personnel audit

The Importance of Network audits

The purpose of a network audit is to accurately assess and document the current state of the network, its components, the people involved, and the human processes used. The audit, in effect, documents the purpose and priorities of the network. Without the audit, you must rely on people's memory, hearsay, and possibly out-of-date or inaccurately documented maps and databases.Without proper documentation and understanding of how things change in the network, you cannot reliably deploy performance and fault network management. You must determine how all devices are connected to each other-both physically and logically-and where the network components are located. From this information, you can determine which devices, ports, and connections are important for the development of your performance and fault management strategy.

Note: When you are working with outside consultants for network design or management issues, the network audit should be the first action they initiate. Without understanding the components, people, and processes, an outside consultant cannot accurately determine the state of the network and develop a plan of action. Regardless of your company's level of documentation, the consultant must still verify that the information matches the physical reality.

Without a proper understanding of physical connectivity and the location of network components, it will take longer to isolate network problems and you stand a greater chance of mistakenly introducing faults into the network during moves, adds, and changes.

although commercial auto-discovery and mapping tools do a good job of drawing logically connected networks, they cannot discover on which floor, building, desk, or closet the devices are located. Trace a cable under the floor or between closets at 3 a.m. and you'll never underestimate the importance of a physical map again!

When a portion of a network goes down or becomes unstable, troubleshooting the source of the outage is done through a process of fault isolation. During an outage or fault, network administrators work as quickly as possible to search out and isolate the source of the problem. In order to do so, they typically begin somewhere in the middle or at the edge of the affected area, and work to reduce the fault domain or area of affected devices. The goal is to get as much of the network operating around the fault domain as possible. With proper documentation, this goal is much easier to achieve. In addition, in a well-documented network, the network manager knows which applications and users are affected by a problem, and can proactively notify the user community.

In a poorly documented network, fault isolation becomes a game of finding a needle in the haystack...

Read More Show Less

Table of Contents

I. FOUNDATIONS, APPROACHES, AND TOOLS.

1. Conducting a Network Audit.
The Importance of Network Audits. The Importance of Documentation. Conduct a Physical Inventory Audit. Where Are Your Wiring Closets? Where Are Your Wires? Where Are Your Network Devices? Where Are Your Servers? Where Are Your Key Users? Conducting a Connectivity Audit. Standardization. Layer 2 Connectivity. Layer 3 Connectivity. Who Is Responsible for the Devices? Process Analysis. Summary. References. Books. Paper. Internet Resource.

2. Policy-Based Network Management.
An Overview of Policy-Based Management. Defining Network Policies. Communication and Network Policies. Converting Policies into Technologies. Network Baselining. Planning the First Baseline. Identifying Devices and Ports of Interest. Determining the Duration of the Baseline. Using the Baseline Data. Using Service Level Agreements. Using the Baseline to Define SLAs. Using Operational Concepts to Define SLAs. Using Policy-Based Management: An Example. Drafting the Policies. Conducting the Baseline Analysis. Charting the SLA. Summary. References. Books. Internet Resource.

3. Developing the Network Knowledge Base.
Why Develop a Knowledge Base? Defining the Knowledge Base Structure. Understanding Data Sources. Network Inventory. Policy-based Network Management. Performance Measurement and Reporting. Configuring Events. Prioritizing Faults. Keeping the Knowledge Base Current. Layer 2 and Layer 3 Connectivity.Device Connectivity. Verifying Interesting Ports. Detecting Redundancy. Name Resolution. Verification of Device and Port Configuration. Summary.

4. Performance Measurement and Reporting.
What Is Performance Management? Performance Data Collection. Performance Data Reporting. Network and Device Health Reporting. Fault Reporting. Capacity Reporting. Measuring Network Performance. Availability. Response Time. Accuracy. Utilization. Summary. References. Books. Internet Resources.

5. Configuring Events.
Understanding Event Types. Configuring Events for Continuous Data Sources. Configuring Events for Discrete Data Sources. Controlling Event Generation. Throttling Events. Lengthening the Sample Rate. Hysteresis. Determining When You Want Events to Be Triggered. Using Built-in Events. Console Messages. System Event Logs, Syslog Messages, and Applications Logs. SNMP Notifications. Configuring Events. Setting RMON Thresholds Using SNMP. Setting RMON Thresholds Using RMON Managers. Setting RMON Thresholds Using the Cisco IOS CLI. Setting Continuous Thresholds on Discrete Objects. Programming Devices to Configure Events. Setting Triggers by Collecting and Analyzing Data. Summary. References. Standards.

6. Event and Fault Management.
Event Overview. Event Producers. Protocols. Event Processing to Determine Faults. Event Collection, Normalization, and Filtering. Correlating Events to Determine Faults. Fault Delivery, Notification, Reporting, and Repair. Methods of Fault Delivery. Notifying Key Personnel of Critical Faults. Reporting Faults. Effecting Fault Repair. Summary.

7. Understanding and Using Basic Network Statistics.
The Need to Understand Network Statistics. Availability Statistics. Random Nature of Network Performance Variables. Simulations. Basic Statistical Measures and Applications. Average, Mode, and Median. Range, Variance, and Standard Deviation. Weighted Mean. Application of the Statistical Methods. Response Times. Using Network Simulations to Analyze Response Time. Applying Statistical Analysis to Response Time in an Example Network. Moving Exponential Average for Cisco Routers CPU Calculation. Summary. References. Books. Periodical. Standards.

8. Understanding Network Management Protocols.
Ping. Traceroute. Terminal Emulators. Simple Network Management Protocol. SNMP Versions. SNMP Packet Formats. SNMP Operations. Structure of Management Information. SNMP Object Types. SNMP Views. Evolution of the Interfaces Group. Remote Monitoring MIB and Related MIBs. Syslog. Cisco Discovery Protocol. Name Service. Summary. References. Books.

9. Selecting the Tools.
NMS Frameworks. Knowledge Base Tools. Performance Measurement and Reporting Tools. Reducing NMS Traffic. Tracking Interface Data. Performance Monitoring and Reporting. Criteria for Selecting Performance Management and Reporting Tools. Performance Measurement and Reporting Tools. Event and Fault Management Tools. Configuring Event Generation. Event Collection Tools. Event Correlation Tools. Fault Management Tools. Policy Management Tools. Summary. References. Internet Resources.

II. MANAGING DEVICES AND TECHNOLOGIES.

10. Managing Hardware and Environmental Characteristics.
Hardware Characteristics of Routers. Backplane Bus Architecture in the 7x00 Series Routers. IDBs (Interface Descriptor Blocks). Hardware Buffers. Hardware Characteristics of Catalyst LAN Switches. Environmental Characteristics. Performance Management Data for Router Hardware. MIB Variables for Chassis Information. CLI Commands for Chassis Information. MIB Variables for Card Information. CLI Commands for Card Information. Syslog Messages for Card Information. Chassis and Card Information via the Entity MIB. Performance Management Data for Switches. MIB Variables for Chassis Information. Chassis Information via show version. MIB Variables for Card Information. CLI Commands for Line Card Information. SNMP Traps and Syslog Messages for Chassis and Line Card Information. Chassis and Card Information via the Entity MIB. Error/Fault Data for Router Hardware. MIB Variables for Router Failure. CLI Commands for Router Failure. SNMP Traps for Router Failure 4. Error/Fault Data for Switch Hardware. MIB Variables for Switch Failures. CLI Commands for Switch Failure. SNMP Traps for Switch Failure. Error/Fault Data for Router Environmental Characteristics. MIB Variables for Voltages (Power Supply). CLI Commands for Voltages. SNMP Traps for Voltages. Syslog Messages for Voltages. MIB Variables for Temperature. CLI Commands for Temperature. SNMP Traps for Temperature. Syslog Messages for Temperature. Error/Fault Data for Switch Environmental Characteristics. MIB Variables for Voltages (Power Supply) and Fan. Voltage and Fan Information via show system. SNMP Traps for Voltage and Fan Information. Syslog Messages for Voltage and Fan Information. MIB Variables for Temperature. Temperature Information via show system. SNMP Traps for Temperature Information. Syslog Messages for Temperature Information. Summary. References. Internet Resources.

11. Monitoring Network Systems—Processes and Resources.
Overview of Processor Characteristics. Router Processors. Catalyst Switch Processors. Router Switching Paths. Catalyst Switch Switching Paths. Router Memory. Switch Memory. Router Buffers. Switch Buffers. Performance Data for Router Processors. MIB Variables for Router CPU Utilization. CLI Commands Relating to CPU on the Router. MIB Variables for Router Device Uptime. CLI Commands Relating to sysUptime. MIB Variables for Memory Utilization on Routers. CLI Commands for Memory Usage. MIB Variables for Buffer Utilization on Routers. CLI Commands for Buffer Usage. Correlating Different Router Performance Variables. Correlating High CPU Values. Correlating High Memory Usage and Fragmentation. Correlating Buffer Misses. Performance Data for Switch Processors. MIB Variables for Switch Backplane Utilization. CLI Commands for Switch Processor Backplane Statistics. CLI Commands for Monitoring Traffic Utilization on NMP. MIB Variables for Dynamic CAM Entries. CLI Commands for CAM Entries. MIB Variables for Calculating Logical Ports. CLI Commands for Calculating Logical Ports. Error/Fault Data for Router Processors. MIB Variables for Memory Leaking or Depletion. CLI Commands for Analyzing Memory Usage. Syslog Messages Relating to Memory Issues. MIB Variables for Identifying Router Reloads. CLI Commands for Analyzing Reload Crash Conditions. SNMP Traps Relating to Reload Conditions. Syslog Messages Relating to Reload Conditions. Error/Fault Data for Switch Processors. MIB Variables for Switch and Module "Health" Status. CLI Commands for Analyzing Switch and Module Health. SNMP Traps Relating to Switch Health. Syslog Messages Relating to Switch Health. CLI Commands for Analyzing Switch System Resources. Summary. References. Internet Resources.

12. Monitoring System Interfaces.
Overview of System Interfaces. Special Considerations for Sub-interfaces. Special Considerations for ifIndex. Special Considerations on Interface Counters. Special Considerations on High-Speed Interfaces. Performance Monitoring for System Interfaces. Performance Measurements for Full-Duplex Interfaces. Performance Measurements for Sub-interfaces. MIB Variables for Interface Traffic. CLI Commands for Interface Traffic. Error/Fault Monitoring. Link Status. Link Errors. MIB Variables for Interface Errors. Summary. References. Books. Standard.

13. Monitoring Ethernet Interfaces.
Ethernet Overview. Architecture and Theory. Access Method. Collision Domain. Standards. Switched Ethernet Versus Shared Ethernet. Performance Data. MiB Variables for Ethernet Traffic. CLI Commands for Ethernet Traffic. Error/Fault Detection. MIB Variables for Ethernet Errors. MIB Variables for Ethernet Collisions. Syslog Messages Relating to Ethernet Errors. Summary. References. Books. Standards. Paper. Internet Resource.

14. ATM Performance and Fault Management.
Overview of ATM. Performance Management. Router/Catalyst Switch Interfaces. LS1010 and Catalyst 8500MSR Interfaces. Fault Management for ATM Interfaces. Router/Catalyst Interfaces. LS1010/8500MSR Interfaces. Summary. References. Books. Standards. Internet Resource.

15. Monitoring VLANs.
Overview of VLAN Characteristics. Logical Versus Physical Ports. VLAN Trunking. Spanning Tree (802.1d). Performance Management Data for VLANs. Logical Versus Physical Ports. VLAN Utilization. Error/Fault Data for VLANs. MIBs to Monitor for Spanning Tree Topology Changes. CLI Commands Relating to the Spanning Tree. SNMP Traps Relating to Spanning Tree. syslog Messages Relating to Spanning Tree. Summary. References. Internet Resources.

16. Managing WAN Technologies—Frame Relay.
Overview of Frame Relay. Identifying Frame Relay Interfaces. Identifing Frame Relay Interfaces. Using the Cisco Frame-Relay MIB to Identify the Sub-interface. Performance Data for Frame Relay. Measuring Utilization On Frame Relay Virtual Circuits. Congestion Monitoring. Correlating Performance Variables. Error/Fault Data for Frame Relay. Monitoring Frame Relay Circuit Flapping. Monitoring Frame-Relay Errored Frames. Summary. References. Books. Papers. Standards.

17. Monitoring WAN Technologies—ISDN and Dial.
Overview of Dial Networking. Access Physical Resources. Access Logical Resources: Logical Constructs and Logical Interfaces. Key-Managed Modem Benefits. Performance Data for ISDN and Dial. MIB Variables for Modem Status Monitoring. CLI Commands for Modem Status Monitoring. MIB Variables for Monitoring of Connection Statistics. CLI Commands for Monitoring of Connection Statistics. MIB Variables for Monitoring Modem Connection Speeds. CLI Commands for Monitoring Modem-Connection Speeds. MIB Variables for Measuring Modem Utilization of the NAS. CLI Commands for Measuring Utilization of the NAS. MIB Variables for Measuring ISDN Utilization. CLI Commands for Measuring ISDN Utilization. Correlating Variables and Performance Issues. Error/Fault Data for Dial and ISDN. MIB Variables for Monitoring Connection Errors. CLI Commands for Monitoring Connection Statistics. CLI Commands for Monitoring Modem Firmware. MIB Variables for Measuring ISDN/PRI Service. MIB Variables for Monitoring ISDN and Modem Connections. CLI Commands for ISDN/PRI Service. MIB Variables for Monitoring Modem and ISDN Trap States. Syslog Messages for Modem and ISDN Trap Information. Summary. References. Book. Internet Resources.

III. OPTIMAL MANAGEMENT.

18. Best Practices for Device Configuration.
Setting Up Telnet Access Characteristics. Set the Terminal Length to 0 When Using Scripts to Gather the Data. Use TACACS+ or RADIUS On the Devices for Access. Setting Up a Loopback Interface. Setting Up NTP. Configuring NTP on a Router. Setting Up SNMP. Enabling SNMP on Cisco Devices. Controlling SNMP Trap Messages. Setting the SNMP Packet Size to the Maximum. Controlling SNMP Access Using Views and Access Lists. Setting Up Logging. Enable Logging on the Cisco device. Timestamp the Log Messages. Source All Messages from the Loopback0 Interface's IP Address. Buffer the Log Messages on the Cisco Device. Setting Up RMON. Setting Up CDP. Setting Up SPAN on a Switch. Summary. References. Internet Resources.

19. Frequently Asked Questions.
Conventions. General Network Management. How Do I Configure Logging to a syslog Server? How Do I Configure an RMON Threshold? What Threshold Values Should I Use? How Can I Track if a Router or Switch Disappears from the Network? How Do I Graph Data that Require a Calculation? How Can I Enable or Disable Certain Types of Traps? How Can I Collect Information that Is Available in a show Command, but Not Through SNMP? How Can I Force a Router to Consistently Provide the Same Source IP Address for Any Traps or syslog Messages? Why Can't I Collect RMON Statistics from a Switch? System-Related Questions. How Do I Collect CPU Utilization? Collecting CPU Utilization on Catalyst 4000, 5000, and 6000 Series Switches. Why Is IP SNMP Causing High CPU Utilization? How Do I Collect Free and Largest Block of Contiguous Memory? How Do I Collect Catalyst Switch Backplane Utilization? How Can I Measure Router or Switch Health? How Do I Measure the Ratio of Buffer Hits to Misses? How Do I Measure the Ratio of Process-switched Packets to Total Packets? How Can I Avoid a Device Appearing to Be Down if a Single Managed Interface Goes Down? How Can I Track When a Power Supply Dies or a Redundant Supply Changes State? How Do I Track When a Cisco Device Reloads and Determine the Reload Reason? General Interface Management. Can MIB II ifTable Variables (such as ifInOctets) Be Collected from Sub-interfaces? How Can I Collect Interface Utilization and Monitor It Over Time? How Can I Measure Utilization for IOS Sub-interfaces? How Do I Collect Interface Utilization from High-Speed Interfaces such as ATM and Gigabit Ethernet? How Do I Disable/Enable Traps for Specific Router or Switch Ports? Why Does My Interface Utilization Appear to Be Greater than 100 Percent? How Can I Measure Interface Health? How Can I Detect When an Interface Goes Down? How Can I Determine the Bandwidth of an Interface or Sub-interface? How do I Track the Number of Broadcasts Received on a Particular Interface? How Do I Clear Device SNMP Counters? How Can I Collect Interface Information when the Ifindex Always Changes for Interfaces? VLAN/Spanning Tree. How Do I Collect VLAN Utilization? How Can I Track Spanning Tree Topology Changes? Why Do I See the Spanning Tree for Only One VLAN with SNMP? Frame Relay. How Can I Measure the Number of Frame Relay Drops that Occur? How Do I Measure Frame Relay Circuit Utilization? How Can I Detect if a Frame Relay PVC Changes State? ATM, ISDN, and Dial. How Do I Get ATM Sub-interface Traffic Statistics? How Can I Track Rejected Modem and ISDN Calls? How Can I Track Calls that Are Rejected Due to Lack of B Channels or Modem Available? Summary.

IV. APPENDIXES.

Appendix A: CCO, MIBs, Traps, and Your NMS.
Cisco MIB Evolution. Cisco MIB Structure. How to Navigate MIBs on Cisco's Web Site. Researching Support for New Devices and Versions of Code. Compiling MIBs. Getting Trap Definitions for OV and NV. Identifying Unknown Traps.

Appendix B: ATM Accounting Files.
Index.
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)