Switched Networks Companion Guide [NOOK Book]

Overview

Switched Networks Companion Guide is the official supplemental textbook for the Switched Networks course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.

This course describes the architecture, components, and operations of a converged switched network. You will learn about the hierarchical network design model and how to configure a switch for basic and advanced functionality. By the end of this course, you will be able to troubleshoot and resolve ...

See more details below
Switched Networks Companion Guide

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac

Want a NOOK? Explore Now

NOOK Book (eBook)
$42.66
BN.com price
(Save 20%)$53.33 List Price

Overview

Switched Networks Companion Guide is the official supplemental textbook for the Switched Networks course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.

This course describes the architecture, components, and operations of a converged switched network. You will learn about the hierarchical network design model and how to configure a switch for basic and advanced functionality. By the end of this course, you will be able to troubleshoot and resolve common issues with Virtual LANs and inter-VLAN routing in a converged network. You will also develop the knowledge and skills needed to implement a WLAN in a small-to-medium network.

The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

The book’s features help you focus on important concepts to succeed in this course:

  • Chapter objectives–Review core concepts by answering the focus questions listed at the beginning of each chapter.
  • Key terms–Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.
  • Glossary–Consult the comprehensive Glossary more than 300 terms.
  • Summary of Activities and Labs–Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.
  • Check Your Understanding–Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.

Related Title:

Switched Networks Lab Manual

ISBN-10: 1-58713-327-X

ISBN-13: 978-1-58713-327-5

  • How To–Look for this icon to study the steps you need to learn to perform certain tasks.
  • Interactive Activities–Reinforce your understanding of topics with all the different exercises from the online course identified throughout the book with this icon.
  • Videos–Watch the videos embedded within the online course.
  • Packet Tracer Activities–Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters.
  • Hands-on Labs–Work through all the course labs and Class Activities that are included in the course and published in the separate Lab Manual.
Read More Show Less

Product Details

  • ISBN-13: 9780133476446
  • Publisher: Pearson Education
  • Publication date: 5/2/2014
  • Series: Companion Guide
  • Sold by: Barnes & Noble
  • Format: eBook
  • Edition number: 1
  • Pages: 552
  • Sales rank: 1,356,713
  • File size: 21 MB
  • Note: This product may take a few minutes to download.

Meet the Author

Erich Spengler is the Director for the Center for System Security and Information Assurance, based at Moraine Valley CC. Erich is a Professor of Computer Integrated Technologies at Moraine Valley and has been teaching Cisco Academy courses for over 15 years. Erich is an ITQ-certified instructor for Cisco Academy. Erich is an active CISSP and has helped dozens of others earn the CISSP designation.

Erich has over 25 years of professional experience in IT systems and security. Erich’s Center has trained over 1000 faculty since 2003 in VMware, CyberSecurity, Cisco, EMC, and Linux.

In his downtime, Erich enjoys spending time with his wife and two daughters.

Wayne Lewis wears three hats: Cisco Academy Manager for the Pacific Center for Advanced Technology Training, NetAcad Contact for the Central Pacific Academy Support and Instructor Training Center, and Professor at Honolulu Community College. Okay . . . four hats: Wayne teaches calculus, linear algebra, and differential equations at the University of Hawaii at Manoa.

Honolulu CC has been an instructor training center for Cisco Academy since 1998, and its instructors are responsible for training many of the initial cohorts of Cisco Academy instructors in countries throughout Asia, Europe, and the Americas. Wayne has been involved in curriculum development and assessment for Cisco Academy since 1999.

Wayne spends his free time doing math (representation theory, algebraic geometry, and several complex variables) and watching marathon sessions of TV series with his family (their favorites to rewatch are South Park, The Office, Monty Python, and Lost).

Read More Show Less

Table of Contents

Introduction xix

Chapter 1 Introduction to Switched Networks 1

Objectives 1

Key Terms 1

Introduction (1.0.1.1) 2

LAN Design (1.1) 3

Converged Networks (1.1.1) 3

Growing Complexity of Networks (1.1.1.1) 3

Elements of a Converged Network (1.1.1.2) 5

Cisco Borderless Network (1.1.1.3) 6

Hierarchy in the Borderless Switched Network (1.1.1.4) 7

Access, Distribution, and Core Layers (1.1.1.5) 9

Switched Networks (1.1.2) 11

Role of Switched Networks (1.1.2.1) 12

Form Factors (1.1.2.2) 13

Traffic Flow (1.1.2.3) 15

Multilayer Switching (1.1.2.4) 16

Switch Features (1.1.3) 17

Port Density (1.1.3.1) 17

Forwarding Rates (1.1.3.2) 19

Power over Ethernet (1.1.3.3) 19

Cisco Catalyst Switch Breakdown (1.1.3.4) 21

The Switched Environment (1.2) 23

Frame Forwarding (1.2.1) 23

Switching as a General Concept in Networking and Telecommunications (1.2.1.1) 23

Dynamically Populating a Switch MAC Address Table (1.2.1.2) 25

Switch Forwarding Methods (1.2.1.3) 28

Store-and-Forward Switching (1.2.1.4) 29

Cut-Through Switching (1.2.1.5) 30

Switching Domains (1.2.2) 31

Collision Domains (1.2.2.1) 32

Broadcast Domains (1.2.2.2) 32

Alleviating Network Congestion (1.2.2.3) 33

Summary (1.3) 35

Practice 37

Class Activities 37

Labs 37

Packet Tracer Activities 37

Check Your Understanding Questions 37

Chapter 2 Basic Switching Concepts and Configuration 41

Objectives 41

Key Terms 41

Introduction (2.0.1.1) 42

Basic Switch Configuration (2.1) 43

Configure a Switch with Initial Settings (2.1.1) 43

Switch Boot Sequence (2.1.1.1) 43

Recovering From a System Crash (2.1.1.2) 44

Switch LED Indicators (2.1.1.3) 45

Preparing for Basic Switch Management (2.1.1.4) 47

Configuring Basic Switch Management Access with IPv4 (2.1.1.5) 47

Configure Switch Ports (2.1.2) 50

Duplex Communication (2.1.2.1) 50

Configure Switch Ports at the Physical Layer (2.1.2.2) 51

Auto-MDIX (2.1.2.3) 52

Verifying Switch Port Configuration (2.1.2.4) 53

Network Access Layer Issues (2.1.2.5) 55

Troubleshooting Network Access Layer Issues (2.1.2.6) 58

Switch Security: Management and Implementation (2.2) 59

Secure Remote Access (2.2.1) 60

SSH Operation (2.2.1.1) 60

Configuring SSH (2.2.1.2) 62

Verifying SSH (2.2.1.3) 64

Security Concerns in LANs (2.2.2) 66

Common Security Attacks: MAC Address Flooding (2.2.2.1) 66

Common Security Attacks: DHCP Spoofing (2.2.2.2) 69

Common Security Attacks: Leveraging CDP (2.2.2.3) 70

Security Best Practices (2.2.3) 72

Best Practices (2.2.3.1) 72

Network Security Tools and Testing (2.2.3.2) 73

Network Security Audits (2.2.3.3) 74

Switch Port Security (2.2.4) 74

Secure Unused Ports (2.2.4.1) 74

DHCP Snooping (2.2.4.2) 75

Port Security: Operation (2.2.4.3) 77

Port Security: Violation Modes (2.2.4.4) 78

Port Security: Configuring (2.2.4.5) 80

Port Security: Verifying (2.2.4.6) 81

Ports in Error-Disabled State (2.2.4.7) 83

Network Time Protocol (NTP) (2.2.4.8) 85

Summary (2.3) 88

Practice 90

Class Activities 90

Labs 90

Packet Tracer Activities 90

Check Your Understanding Questions 91

Chapter 3 VLANs 95

Objectives 95

Key Terms 95

Introduction (3.0.1.1) 96

VLAN Segmentation (3.1) 97

Overview of VLANs (3.1.1) 97

VLAN Definitions (3.1.1.1) 97

Benefits of VLANs (3.1.1.2) 98

Types of VLANs (3.1.1.3) 99

Voice VLANs (3.1.1.4) 101

VLANs in a Multiswitch Environment (3.1.2) 102

VLAN Trunks (3.1.2.1) 102

Controlling Broadcast Domains with VLANs (3.1.2.2) 103

Tagging Ethernet Frames for VLAN Identification (3.1.2.3) 105

Native VLANs and 802.1Q Tagging (3.1.2.4) 106

Voice VLAN Tagging (3.1.2.5) 107

VLAN Implementations (3.2) 109

VLAN Assignment (3.2.1) 109

VLAN Ranges on Catalyst Switches (3.2.1.1) 110

Creating a VLAN (3.2.1.2) 111

Assigning Ports to VLANs (3.2.1.3) 112

Changing VLAN Port Membership (3.2.1.4) 113

Deleting VLANs (3.2.1.5) 116

Verifying VLAN Information (3.2.1.6) 117

VLAN Trunks (3.2.2) 119

Configuring IEEE 802.1Q Trunk Links (3.2.2.1) 119

Resetting the Trunk to the Default State (3.2.2.2) 121

Verifying Trunk Configuration (3.2.2.3) 123

Dynamic Trunking Protocol (3.2.3) 124

Introduction to DTP (3.2.3.1) 125

Negotiated Interface Modes (3.2.3.2) 126

Troubleshoot VLANs and Trunks (3.2.4) 128

IP Addressing Issues with VLAN (3.2.4.1) 128

Missing VLANs (3.2.4.2) 129

Introduction to Troubleshooting Trunks (3.2.4.3) 131

Common Problems with Trunks (3.2.4.4) 132

Trunk Mode Mismatches (3.2.4.5) 133

Incorrect VLAN List (3.2.4.6) 135

VLAN Security and Design (3.3) 138

Attacks on VLANs (3.3.1) 138

Switch Spoofing Attack (3.3.1.1) 138

Double-Tagging Attack (3.3.1.2) 139

PVLAN Edge (3.3.1.3) 140

VLAN Best Practices (3.3.2) 142

VLAN Design Guidelines (3.3.2.1) 142

Summary (3.4) 144

Practice 146

Class Activities 146

Labs 146

Packet Tracer Activities 146

Check Your Understanding Questions 147

Chapter 4 LAN Redundancy 151

Objectives 151

Key Terms 151

Introduction (4.0.1.1) 153

Spanning Tree Concepts (4.1) 154

STP Operation (4.1.2) 154

Redundancy at OSI Layers 1 and 2 (4.1.1.1) 154

Issues with Layer 1 Redundancy: MAC Database Instability (4.1.1.2) 156

Issues with Layer 1 Redundancy: Broadcast Storms (4.1.1.3) 161

Issues with Layer 1 Redundancy: Duplicate Unicast Frames (4.1.1.4) 161

STP Operation (4.1.2) 162

Spanning Tree Algorithm: Introduction (4.1.2.1) 162

Spanning Tree Algorithm: Port Roles (4.1.2.2) 165

Spanning Tree Algorithm: Root Bridge (4.1.2.3) 167

Spanning Tree Algorithm: Path Cost (4.1.2.4) 168

802.1D BPDU Frame Format (4.1.2.5) 171

BPDU Propagation and Process (4.1.2.6) 173

Extended System ID (4.1.2.7) 178

Varieties of Spanning Tree Protocols (4.2) 182

Overview (4.2.1) 182

List of Spanning Tree Protocols (4.2.1.1) 182

Characteristics of the Spanning Tree Protocols (4.2.1.2) 183

PVST+ (4.2.2) 185

Overview of PVST+ (4.2.2.1) 185

Port States and PVST+ Operation (4.2.2.2) 186

Extended System ID and PVST+ Operation (4.2.2.3) 188

Rapid PVST+ (4.2.3) 189

Overview of Rapid PVST+ (4.2.3.1) 189

RSTP BPDU (4.2.3.2) 190

Edge Ports (4.2.3.3) 192

Link Types (4.2.3.4) 192

Spanning Tree Configuration (4.3) 193

PVST+ Configuration (4.3.1) 193

Catalyst 2960 Default Configuration (4.3.1.1) 194

Configuring and Verifying the Bridge ID (4.3.1.2) 194

PortFast and BPDU Guard (4.3.1.3) 196

PVST+ Load Balancing (4.3.1.4) 199

Rapid PVST+ Configuration (4.3.2) 202

Spanning Tree Mode (4.3.2.1) 202

STP Configuration Issues (4.3.3) 205

Analyzing the STP Topology (4.3.3.1) 205

Expected Topology Versus Actual Topology (4.3.3.2) 206

Overview of Spanning Tree Status (4.3.3.3) 207

Spanning Tree Failure Consequences (4.3.3.4) 207

Repairing a Spanning Tree Problem (4.3.3.5) 210

First Hop Redundancy Protocols (4.4) 210

Concept of First Hop Redundancy Protocols (4.4.1) 211

Default Gateway Limitations (4.4.1.1) 211

Router Redundancy (4.4.1.2) 212

Steps for Router Failover (4.4.1.3) 213

Varieties of First Hop Redundancy Protocols (4.4.2) 214

First Hop Redundancy Protocols (4.4.2.1) 214

FHRP Verification (4.4.3) 215

HSRP Verification (4.4.3.1) 216

GLBP Verification (4.4.3.2) 217

Summary (4.5) 220

Practice 221

Class Activities 221

Labs 221

Packet Tracer Activities 221

Check Your Understanding Questions 222

Chapter 5 Link Aggregation 227

Objectives 227

Key Terms 227

Introduction (5.0.1.1) 228

Link Aggregation Concepts (5.1) 228

Link Aggregation (5.1.1) 229

Introduction to Link Aggregation (5.1.1.1) 229

Advantages of EtherChannel (5.1.1.2) 230

EtherChannel Operation (5.1.2) 231

Implementation Restrictions (5.1.2.1) 231

Port Aggregation Protocol (5.1.2.2) 232

Link Aggregation Control Protocol (5.1.2.3) 234

Link Aggregation Configuration (5.2) 235

Configuring EtherChannel (5.2.1) 235

Configuration Guidelines (5.2.1.1) 236

Configuring Interfaces (5.2.1.2) 237

Verifying and Troubleshooting EtherChannel (5.2.2) 238

Verifying EtherChannel (5.2.2.1) 238

Troubleshooting EtherChannel (5.2.2.2) 241

Summary (5.3) 245

Practice 246

Class Activities 246

Labs 246

Packet Tracer Activities 246

Check Your Understanding Questions 247

Chapter 6 Inter-VLAN Routing 251

Objectives 251

Key Terms 251

Introduction (6.0.1.1) 252

Inter-VLAN Routing Configuration (6.1) 252

Inter-VLAN Routing Operation (6.1.1) 253

What Is Inter-VLAN Routing? (6.1.1.1) 253

Legacy Inter-VLAN Routing (6.1.1.2) 254

Router-on-a-Stick Inter-VLAN Routing (6.1.1.3) 255

Multilayer Switch Inter-VLAN Routing (6.1.1.4) 256

Configure Legacy Inter-VLAN Routing (6.1.2) 257

Configure Legacy Inter-VLAN Routing: Preparation (6.1.2.1) 257

Configure Legacy Inter-VLAN Routing: Switch Configuration (6.1.2.2) 259

Configure Legacy Inter-VLAN Routing: Router Interface Configuration (6.1.2.3) 260

Configure Router-on-a-Stick Inter-VLAN Routing (6.1.3) 262

Configure Router-on-a-Stick: Preparation (6.1.3.1) 262

Configure Router-on-a-Stick: Switch Configuration (6.1.3.2) 264

Configure Router-on-a-Stick: Router Subinterface Configuration (6.1.3.3) 265

Configure Router-on-a-Stick: Verifying Subinterfaces (6.1.3.4) 266

Configure Router-on-a-Stick: Verifying Routing (6.1.3.5) 268

Troubleshoot Inter-VLAN Routing (6.2) 270

Inter-VLAN Configuration Issues (6.2.1) 270

Switch Port Issues (6.2.1.1) 270

Verify Switch Configuration (6.2.1.2) 272

Interface Issues (6.2.1.3) 273

Verify Router Configuration (6.2.1.4) 274

IP Addressing Issues (6.2.2) 276

Errors with IP Addresses and Subnet Masks (6.2.2.1) 276

Verifying IP Address and Subnet Mask Configuration

Issues (6.2.2.2) 278

Layer 3 Switching (6.3) 280

Layer 3 Switching Operation and Configuration (6.3.1) 280

Introduction to Layer 3 Switching (6.3.1.1) 280

Inter-VLAN Routing with Switch Virtual Interfaces (6.3.1.2) 282

Inter-VLAN Routing with Routed Ports (6.3.1.4) 284

Configuring Static Routes on a Catalyst 2960 Switch (6.3.1.5) 285

Troubleshoot Layer 3 Switching (6.3.2) 291

Layer 3 Switch Configuration Issues (6.3.2.1) 291

Example: Troubleshooting Layer 3 Switching (6.3.2.2) 292

Summary (6.4) 295

Practice 296

Class Activities 296

Labs 296

Packet Tracer Activities 296

Check Your Understanding Questions 297

Chapter 7 DHCP 303

Objectives 303

Key Terms 303

Introduction (7.0.1.1) 305

Dynamic Host Configuration Protocol v4 (7.1) 306

DHCPv4 Operation (7.1.1) 306

Introducing DHCPv4 (7.1.1.1) 306

DHCPv4 Operation (7.1.1.2) 307

DHCPv4 Message Format (7.1.1.3) 311

DHCPv4 Discover and Offer Messages (7.1.1.4) 313

Configuring a Basic DHCPv4 Server (7.1.2) 315

Configuring a Basic DHCPv4 Server (7.1.2.1) 315

Verifying DHCPv4 (7.1.2.2) 318

DHCPv4 Relay (7.1.2.3) 322

Configure DHCPv4 Client (7.1.3) 325

Configuring a Router as DHCPv4 Client (7.1.3.1) 325

Configuring a SOHO Router as a DHCPv4 Client (7.1.3.2) 326

Troubleshoot DHCPv4 (7.1.4) 327

Troubleshooting Tasks (7.1.4.1) 327

Verify Router DHCPv4 Configuration (7.1.4.2) 329

Debugging DHCPv4 (7.1.4.3) 330

Dynamic Host Configuration Protocol for IPv6 (DHCPv6) (7.2) 331

SLAAC and DHCPv6 (7.2.1) 331

Stateless Address Autoconfiguration (SLAAC) (7.2.1.1) 331

SLAAC Operation (7.2.1.2) 333

SLAAC and DHCPv6 (7.2.1.3) 335

SLAAC Option (7.2.1.4) 336

Stateless DHCPv6 Option (7.2.1.5) 337

Stateful DHCPv6 Option (7.2.1.6) 338

DHCPv6 Operations (7.2.1.7) 339

Stateless DHCPv6 (7.2.2) 342

Configuring a Router as a Stateless DHCPv6 Server (7.2.2.1) 342

Configuring a Router as a Stateless DHCPv6 Client (7.2.2.2) 344

Verifying Stateless DHCPv6 (7.2.2.3) 344

Stateful DHCPv6 Server (7.2.3) 346

Configuring a Router as a Stateful DHCPv6 Server (7.2.3.1) 346

Configuring a Router as a Stateful DHCPv6 Client (7.2.3.2) 349

Verifying Stateful DHCPv6 (7.2.3.3) 349

Configuring a Router as a DHCPv6 Relay Agent (7.2.3.4) 351

Troubleshoot DHCPv6 (7.2.4) 352

Troubleshooting Tasks (7.2.4.1) 353

Verify Router DHCPv6 Configuration (7.2.4.2) 354

Debugging DHCPv6 (7.2.4.3) 355

Summary (7.3) 357

Practice 359

Class Activities 359

Labs 359

Packet Tracer Activities 359

Check Your Understanding Questions 360

Chapter 8 Wireless LANs 363

Objectives 363

Key Terms 363

Introduction (8.0.1.1) 367

Wireless Concepts (8.1) 367

Introduction to Wireless (8.1.1) 367

Supporting Mobility (8.1.1.1) 368

Benefits of Wireless (8.1.1.2) 368

Wireless Technologies (8.1.1.3) 369

Radio Frequencies (8.1.1.4) 370

802.11 Standards (8.1.1.5) 371

Wi-Fi Certification (8.1.1.6) 373

Comparing WLANs to a LAN (8.1.1.7) 375

Components of WLANs (8.1.2) 376

Wireless NICs (8.1.2.1) 376

Wireless Home Router (8.1.2.2) 377

Business Wireless Solutions (8.1.2.3) 379

Wireless Access Points (8.1.2.4) 380

Small Wireless Deployment Solutions (8.1.2.5) 382

Large Wireless Deployment Solutions (8.1.2.6) 385

Large Wireless Deployment Solutions, Cont. (8.1.2.7) 387

Wireless Antennas (8.1.2.8) 389

802.11 WLAN Topologies (8.1.3) 391

802.11 Wireless Topology Modes (8.1.3.1) 391

Ad Hoc Mode (8.1.3.2) 392

Infrastructure Mode (8.1.3.3) 393

Wireless LAN Operations (8.2) 395

802.11 Frame Structure (8.2.1) 395

Wireless 802.11 Frame (8.2.1.1) 395

Frame Control Field (8.2.1.2) 397

Wireless Frame Type (8.2.1.3) 399

Management Frames (8.2.1.4) 400

Control Frames (8.2.1.5) 402

Wireless Operation (8.2.2) 403

Carrier Sense Multiple Access with Collision Avoidance (8.2.2.1) 404

Wireless Clients and Access Point Association (8.2.2.2) 405

Association Parameters (8.2.2.3) 406

Discovering APs (8.2.2.4) 409

Authentication (8.2.2.5) 411

Channel Management (8.2.3) 413

Frequency Channel Saturation (8.2.3.1) 413

Selecting Channels (8.2.3.2) 415

Planning a WLAN Deployment (8.2.3.3) 418

Wireless LAN Security (8.3) 420

WLAN Threats (8.3.1) 420

Securing Wireless (8.3.1.1) 420

DoS Attack (8.3.1.2) 422

Management Frame DoS Attacks (8.3.1.3) 423

Rogue Access Points (8.3.1.4) 425

Man-in-the-Middle Attack (8.3.1.5) 426

Securing WLANs (8.3.2) 428

Wireless Security Overview (8.3.2.1) 428

Shared Key Authentication Methods (8.3.2.2) 430

Encryption Methods (8.3.2.3) 432

Authenticating a Home User (8.3.2.4) 432

Authentication in the Enterprise (8.3.2.5) 434

Wireless LAN Configuration (8.4) 435

Configure a Wireless Router (8.4.1) 435

Configuring a Wireless Router (8.4.1.1) 435

Setting Up and Installing Initial Linksys EA6500 (8.4.1.2) 437

Configuring the Linksys Smart Wi-Fi Home Page (8.4.1.3) 441

Smart Wi-Fi Settings (8.4.1.4) 443

Smart Wi-Fi Tools (8.4.1.5) 446

Backing Up a Configuration (8.4.1.6) 450

Configuring Wireless Clients (8.4.2) 452

Connecting Wireless Clients (8.4.2.1) 452

Troubleshoot WLAN Issues (8.4.3) 453

Troubleshooting Approaches (8.4.3.1) 453

Wireless Client Not Connecting (8.4.3.2) 455

Troubleshooting When the Network Is Slow (8.4.3.3) 456

Updating Firmware (8.4.3.4) 458

Summary (8.5) 460

Practice 461

Class Activities 461

Labs 462

Packet Tracer Activities 462

Check Your Understanding Questions 462

Appendix A Answers to “Check Your Understanding” Questions 465

Glossary 477

9781587133299, TOC, 4/14/14

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)