larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

LAN Switching and Wireless, CCNA Exploration Companion Guide


  • Sorry, this book is no longer in print.
Not for Sale
  • About
  • Description
  • Sample Content
  • Updates


The all-new and only authorized textbook for the new Cisco Networking Academy CCNA Exploration LAN Switching and Wireless course

  • A portable reference that supports the topics in the all-new Cisco Networking Academy CCNA Exploration LAN Switching and Wireless curriculum aligning 1:1 with course modules
  • Features improved readability, enhanced topic explanations, real-world examples, and all-new graphical presentations
  • Written and Edited by leading Academy Instructor

  • Copyright 2008
  • Edition: 1st
  • Book
  • ISBN-10: 1-58713-207-9
  • ISBN-13: 978-1-58713-207-0

LAN Switching and Wireless CCNA Exploration Companion Guide

Wayne Lewis, Ph.D.

LAN Switching and Wireless, CCNA Exploration Companion Guide is the official supplemental textbook for the LAN Switching and Wireless course in the Cisco Networking Academy CCNA® Exploration curriculum version 4. This course provides a comprehensive approach to learning the technologies and protocols needed to design and implement a converged switched network. The Companion Guide, written and edited by a Networking Academy instructor, is designed as a portable desk reference to use anytime, anywhere. The book’s features reinforce the material in the course to help you focus on important concepts and organize your study time for exams.

New and improved features help you study and succeed in this course:

  • Chapter objectives: Review core concepts by answering the questions listed at the beginning of each chapter.
  • Key terms: Refer to the updated lists of networking vocabulary introduced and turn to the highlighted terms in context in each chapter.
  • Glossary: Consult the all-new comprehensive glossary with more than 190 terms.
  • Check Your Understanding questions and answer key: Evaluate your readiness with the updated end-of-chapter questions that match the style of questions you see on the online course quizzes. The answer key explains each answer.
  • Challenge questions and activities: Strive to ace more challenging review questions and activities designed to prepare you for the complex styles of questions you might see on the CCNA exam. The answer key explains each answer.

Wayne Lewis is the Cisco Academy Manager for the Pacific Center for Advanced Technology Training (PCATT), based at Honolulu Community College.

How To: Look for this icon to study the steps that you need to learn to perform certain tasks.

Packet Tracer Activities: Explore networking concepts in activities interspersed throughout some chapters using Packet Tracer v4.1 developed by Cisco. The files for these activities are on the accompanying CD-ROM.

Also available for the LAN Switching and Wireless course:

LAN Switching and Wireless, CCNA Exploration Labs and Study Guide

ISBN-10: 1-58713-202-8

ISBN-13: 978-1-58713-202-5

Companion CD-ROM

The CD-ROM provides many useful tools and information to support your education:

  • Packet Tracer Activity exercise files
  • A Guide to Using a Networker’s Journal booklet
  • Taking Notes: A .txt file of the chapter objectives
  • More IT Career Information
  • Tips on Lifelong Learning in Networking

This book is part of the Cisco Networking Academy Series from Cisco Press®. Books in this series support and complement the Cisco Networking online curriculum.

Sample Pages

Download the sample pages (includes Chapter 1 and Index)

Table of Contents

Chapter 1 LAN Design 1

Objectives 1

Key Terms 1

Switched LAN Architecture 2

    The Hierarchical Network Model 2

        Access Layer 2

        Distribution Layer 3

        Core Layer 3

        A Hierarchical Network in a Medium-Sized Business 4

        Benefits of a Hierarchical Network 4

        Principles of Hierarchical Network Design 6

        Network Diameter 7

        Bandwidth Aggregation 8

        Redundancy 9

    What Is a Converged Network? 10

        Legacy Equipment 10

        Advanced Technology 11

        New Options 12

        Separate Voice, Video, and Data Networks 13

Matching Switches to Specific LAN Functions 15

    Considerations for Hierarchical Network Switches 15

        Traffic Flow Analysis 15

        User Community Analysis 17

        Data Stores and Data Servers Analysis 19

        Topology Diagrams 20

        Switch Features 22

        Switch Form Factors 22

        Switch Performance 24

        Power over Ethernet and Layer 3 Functionality 26

        Switch Features in a Hierarchical Network 28

        Access Layer Switch Features 28

        Distribution Layer Switch Features 30

        Core Layer Switch Features 31

        Switches for Small and Medium Sized Business (SMB) 33

        Catalyst Express 500 33

        Catalyst 2960 34

        Catalyst 3560 35

        Catalyst 3750 36

        Catalyst 4500 36

        Catalyst 4900 37

        Catalyst 6500 38

        Comparing Switches 39

Summary 40

Labs 40

Check Your Understanding 41

Challenge Questions and Activities 44

Chapter 2 Basic Switch Concepts and Configuration 45

Objectives 45

Key Terms 45

Introduction to Ethernet/802.3 LANs 46

    Key Elements of Ethernet/802.3 Networks 46

        CSMA/CD 46

        Ethernet Communications 47

        Duplex Settings 49

        Switch Port Settings 50

        Switch MAC Address Table 51

Design Considerations for Ethernet/802.3 Networks 52

        Bandwidth and Throughput 52

        Collision Domains 53

        Broadcast Domains 54

        Network Latency 54

        Network Congestion 55

        LAN Segmentation 55

    LAN Design Considerations 56

Forwarding Frames Using a Switch 58

    Switch Forwarding Methods 59

    Symmetric and Asymmetric Switching 60

    Memory Buffering 60

    Layer 2 and Layer 3 Switching 62

Switch Management Configuration 63

    Navigating Command-Line Interface Modes 63

        GUI-Based Alternatives to the CLI 65

    Using the Help Facility 68

    Accessing the Command History 70

    Switch Boot Sequence 71

    Prepare to Configure the Switch 72

    Basic Switch Configuration 72

        Management Interface 73

        Default Gateway 74

        Duplex and Speed 75

        HTTP Access 76

        MAC Address Table Management 77

    Verifying Switch Configuration 78

    Basic Switch Management 80

        Backing Up and Restoring Switch Configuration Files 80

        Using a TFTP Server with Switch Configuration Files 82

        Clearing Switch Configuration Information 84

Configuring Switch Security 85

    Configuring Password Options 85

        Securing Console Access 85

        Securing Virtual Terminal Access 87

        Securing Privileged EXEC Access 88

        Encrypting Switch Passwords 89

        Password Recovery 90

    Login Banners 92

        Configure Telnet and SSH 93

        Configuring Telnet 93

        Configuring SSH 94

    Common Security Attacks 96

        MAC Address Flooding 96

        Spoofing Attacks 100

        CDP Attacks 101

        Telnet Attacks 102

    Security Tools 103

    Configuring Port Security 105

    Securing Unused Ports 110

Summary 111

Labs 111

Check Your Understanding 112

Challenge Questions and Activities 117

Chapter 3 VLANs 121

Objectives 121

Key Terms 121

Introducing VLANs 122

    Defining VLANs 122

    Benefits of VLANs 124

    VLAN ID Ranges 126

    Types of VLANs 126

    Voice VLANs 131

        Network Application Traffic Types 133

        Switch Port Membership Modes 136

    Controlling Broadcast Domains with VLANs 138

VLAN Trunking 143

    VLAN Trunks 144

        IEEE 802.1Q Frame Tagging 145

        Native VLANs 147

        Trunking Operation 148

        Trunking Modes 149

Configure VLANs and Trunks 151

    Configure a VLAN 152

    Managing VLANs 155

        Managing VLAN Memberships 158

        Configure a Trunk 160

Troubleshooting VLANs and Trunks 164

    Common Problems with Trunks 165

    A Common Problem with VLAN Configurations 171

Summary 173

Labs 173

Check Your Understanding 174

Challenge Questions and Activities 178

Chapter 4 VTP 181

Objectives 181

Key Terms 181

VTP Concepts 182

    What Is VTP? 182

        Benefits of VTP 184

        VTP Components 184

VTP Operation 186

    Default VTP Configuration 186

    VTP Domains 188

    VTP Advertising 190

        VTP Configuration Revision Number 192

        VTP Advertisement Types 193

    VTP Modes 197

        VTP Server-to-Client Behavior 198

        VTP Server-to-Transparent-to-Client Behavior 199

    VTP Pruning 201

        VTP Pruning in Action 202

Configure VTP 204

    Configuring VTP 204

        Steps to Configuring VTP 206

        Troubleshooting VTP Configurations 212

        Incompatible VTP Versions 212

        VTP Password Issues 212

        Incorrect VTP Domain Name 213

        All Switches Set to VTP Client Mode 214

        VTP Troubleshooting Example 215

    Managing VLANs on a VTP Server 217

Summary 219

Labs 219

Check Your Understanding 220

Challenge Questions and Activities 224

Chapter 5 STP 227

Objectives 227

Key Terms 227

Redundant Layer 2 Topologies 229

    Redundancy 229

    Issues with Redundancy 234

        Broadcast Storms 238

        Duplicate Unicast Frames 240

        Real-World Redundancy Issues 241

        Loops in the Wiring Closet 242

        Loops in Cubicles 243

Introduction to STP 244

    Spanning-Tree Algorithm (STA) 244

        STP Topology 245

        Port Types in the Spanning-Tree Algorithm 247

        Root Bridge 248

        Best Paths 249

    STP BPDU 252

        BPDU Process 253

Bridge ID 258

        Configure and Verify the BID 261

    Port Roles 263

        Configure Port Priority 265

        Port Role Decisions 266

    STP Port States and BPDU Timers 268

        Cisco PortFast 271

STP Convergence 273

    Step 1. Elect a Root Bridge 273

        Verify Root Bridge Election 274

    Step 2. Elect Root Ports 276

        Verify Root Port Election 278

    Step 3. Elect Designated and Nondesignated Ports 279

        Verify Designated and Nondesignated Port Election 283

    STP Topology Change 285

PVST+, RSTP, and Rapid PVST+ 286

    Cisco and IEEE STP Variants 287

        Per-VLAN Spanning-Tree (PVST) Overview 287

        Per-VLAN Spanning-Tree Plus (PVST+) Overview 287

        Rapid Spanning-Tree Protocol (RSTP) Overview 288

        Multiple Spanning-Tree Protocol (MSTP) Overview 288

    PVST+ 288

        Configure PVST+ 291

    RSTP 294

        RSTP BPDU 295

    Edge Ports 296

    Link Types 297

    RSTP Port States and Port Roles 298

        RSTP Proposal and Agreement Process 301

    Configuring Rapid PVST+ 309

    Design STP for Trouble Avoidance 312

        Minimize the Number of Blocked Ports 313

        Use Layer 3 Switching 314

        Keep STP Even if It Is Unnecessary 316

        Keep Traffic off of the Management VLAN 316

    Troubleshoot STP Operation 316

        PortFast Configuration Error 317

        Network Diameter Issues 318

Summary 320

Labs 320

Check Your Understanding 321

Challenge Questions and Activities 327

Chapter 6 Inter-VLAN Routing 331

Objectives 331

Key Terms 331

Inter-VLAN Routing 332

    Introducing Inter-VLAN Routing 332

        One-Router-Interface-per-VLAN 332

        Router-on-a-Stick 334

        Layer 3 Switch 336

        Interfaces and Subinterfaces 337

        One-Router-Interface-per-VLAN 338

        Router-on-a-Stick 341

        Considerations for Inter-VLAN Routing Methods 345

Configuring Inter-VLAN Routing 347

    Configure Inter-VLAN Routing 347

    Configure Router-on-a-Stick Inter-VLAN Routing 351

Troubleshooting Inter-VLAN Routing 356

    Switch Configuration Issues 356

        Switch Cisco IOS Commands for Troubleshooting 359

    Router Configuration Issues 360

        Router Cisco IOS Commands for Troubleshooting 361

    IP Addressing Issues 362

        IP Addressing Cisco IOS Verification Commands 364

Summary 366

Labs 366

Check Your Understanding 367

Challenge Questions and Activities 373

Chapter 7 Basic Wireless Concepts and Configuration 377

Objectives 377

Key Terms 377

The Wireless LAN 379

    Why Use Wireless? 379

        Wireless LANs 380

        Comparing a WLAN to a LAN 381

        Wireless LAN Components 383

    Wireless LAN Standards 383

        Wi-Fi Certification 386

    Wireless Infrastructure Components 387

        Wireless NICs 387

        Wireless Access Points 388

        Wireless Routers 390

    Wireless Operation 391

        Configurable Wireless Parameters 391

        Wireless Topologies 393

        Wireless Association 396

    Planning the Wireless LAN 399

Wireless LAN Security 402

    Threats to Wireless Security 402

        Rogue Access Points 402

        Man-in-the-Middle Attacks 403

        Denial of Service 404

    Wireless Security Protocols 405

        Authenticating the Wireless LAN 407

        Wireless Encryption 408

        Controlling Access to the WLAN 409

Configure Wireless LAN Access 410

    Configuring the Wireless Access Point 410

        Configuring Basic Wireless Settings 413

        Configuring Wireless Security 415

        Configuring a Wireless NIC 418

        Scan for SSIDs 418

        Select the Wireless Security Protocol 420

        Verify Connectivity to the WLAN 423

Troubleshooting Simple WLAN Problems 424

    A Systematic Approach to WLAN Troubleshooting 424

    Solve Access Point Radio and Firmware Issues 426

    Channel Settings 426

    RF Interference 429

    Access Point Placement 431

    Authentication and Encryption 434

Summary 436

Labs 436

Check Your Understanding 437

Challenge Questions and Activities 441

Appendix Check Your Understanding and Challenge Questions

Answer Key 445

Glossary 461

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.


Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.


If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.


This site is not directed to children under the age of 13.


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at and we will process the deletion of a user's account.


Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive:

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020