Connecting Networks v6 Companion Guide
Home > Computing and Information Technology > Computer networking and communications > Networking packages > Connecting Networks v6 Companion Guide
Connecting Networks  v6 Companion Guide

Connecting Networks v6 Companion Guide

|
     0     
5
4
3
2
1




Out of Stock


Notify me when this book is in stock
About the Book

Connecting Networks v6 Companion Guide is the official supplemental textbook for the Connecting Networks version 6 course in the Cisco Networking Academy CCNA Routing and Switching curriculum. The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time. The book’s features help you focus on important concepts to succeed in this course: Chapter Objectives–Review core concepts by answering the focus questions listed at the beginning of each chapter. Key Terms–Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter. Glossary–Consult the comprehensive Glossary with 347 terms. Summary of Activities and Labs–Maximize your study time with this complete list of all associated practice exercises at the end of each chapter. Check Your Understanding–Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.   How To–Look for this icon to studythe steps you need to learn to perform certain tasks. Interactive Activities–Reinforce your understanding of topics with dozens of exercises from the online course identified throughout the book with this icon. Packet Tracer Activities–Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters and provided in the accompanying Labs & Study Guide book. Videos–Watch the videos embedded within the online course. Hands-on Labs–Work through all the course labs and additional Class Activities that are included in the course and published in the separate Labs & Study Guide.  

Table of Contents:
Introduction xix Chapter 1 WAN Concepts 1 Objectives 1 Key Terms 1 Introduction (1.0) 3 WAN Technologies Overview (1.1) 3     Purpose of WANs (1.1.1) 3         Why a WAN? (1.1.1.1) 3         Are WANs Necessary? (1.1.1.2) 4         WAN Topologies (1.1.1.3) 5         Evolving Networks (1.1.1.4) 8         Small Office (1.1.1.5) 8         Campus Network (1.1.1.6) 9         Branch Networks (1.1.1.7) 10         Distributed Network (1.1.1.8) 11     WAN Operations (1.1.2) 13         WANs in the OSI Model (1.1.2.1) 13         Common WAN Terminology (1.1.2.2) 14         WAN Devices (1.1.2.3) 16         Circuit Switching (1.1.2.4) 17         Packet Switching (1.1.2.5) 18 Selecting a WAN Technology (1.2) 20     WAN Services (1.2.1) 20         WAN Link Connection Options (1.2.1.1) 20         Service Provider Network Infrastructure (1.2.1.2) 21     Private WAN Infrastructures (1.2.2) 23         Leased Lines (1.2.2.1) 23         Dialup (1.2.2.2) 25         ISDN (1.2.2.3) 26         Frame Relay (1.2.2.4) 28         ATM (1.2.2.5) 29         Ethernet WAN (1.2.2.6) 30         MPLS (1.2.2.7) 32         VSAT (1.2.2.8) 32     Public WAN Infrastructure (1.2.3) 33         DSL (1.2.3.1) 34         Cable (1.2.3.2) 35         Wireless (1.2.3.3) 36         3G/4G Cellular (1.2.3.4) 37         VPN Technology (1.2.3.5) 38     Selecting WAN Services (1.2.4) 39         Choosing a WAN Link Connection (1.2.4.1) 40         Choosing a WAN Link Connection (Cont.) (1.2.4.2) 41 Summary (1.3) 43 Practice 44     Class Activities 44     Labs 44 Check Your Understanding Questions 44 Chapter 2 Point-to-Point Connections 49 Objectives 49 Key Terms 49 Introduction (2.0) 51 Serial Point-to-Point Overview (2.1) 51     Serial Communications (2.1.1) 52         Serial and Parallel Ports (2.1.1.1) 52         Point-to-Point Communication Links (2.1.1.2) 53         Serial Bandwidth (2.1.1.3) 54     HDLC Encapsulation (2.1.2) 56         WAN Encapsulation Protocols (2.1.2.1) 56         HDLC Encapsulation (2.1.2.2) 57         Configuring HDLC Encapsulation (2.1.2.3) 58         Troubleshooting a Serial Interface (2.1.2.4) 59 PPP Operation (2.2) 63     Benefits of PPP (2.2.1) 63         Introducing PPP (2.2.1.1) 64         Advantages of PPP (2.2.1.2) 65     LCP and NCP (2.2.2) 65         PPP-Layered Architecture (2.2.2.1) 65         PPP: Link Control Protocol (LCP) (2.2.2.2) 66         PPP: Network Control Protocol (NCP) (2.2.2.3) 66         PPP Frame Structure (2.2.2.4) 67     PPP Sessions (2.2.3) 68         Establishing a PPP Session (2.2.3.1) 68         LCP Operation (2.2.3.2) 69         PPP Configuration Options (2.2.3.3) 72         NCP Explained (2.2.3.4) 72 PPP Implementation (2.3) 74     Configure PPP (2.3.1) 74         PPP Configuration Options (2.3.1.1) 74         PPP Basic Configuration Command (2.3.1.2) 76         PPP Compression Commands (2.3.1.3) 76         PPP Link Quality Monitoring Command (2.3.1.4) 77         PPP Multilink Commands (2.3.1.5) 78         Verifying PPP Configuration (2.3.1.6) 81     Configure PPP Authentication (2.3.2) 82         PPP Authentication Protocols (2.3.2.1) 83         Password Authentication Protocol (PAP) (2.3.2.2) 83         Challenge Handshake Authentication Protocol (CHAP) (2.3.2.3) 85         PPP Authentication Command (2.3.2.4) 86         Configuring PPP with Authentication (2.3.2.5) 87 Troubleshoot WAN Connectivity (2.4) 89     Troubleshoot PPP (2.4.1) 89         Troubleshooting PPP Serial Encapsulation (2.4.1.1) 90         Debugging PPP (2.4.1.2) 91         Troubleshooting a PPP Configuration with Authentication (2.4.1.3) 94 Summary 96 Practice 97     Class Activities 97     Labs 97     Packet Tracer Activities 98 Check Your Understanding Questions 98 Chapter 3 Branch Connections 101 Objectives 101 Key Terms 101 Introduction (3.0) 103 Remote-Access Connections (3.1) 104     Broadband Connections (3.1.1) 104         What Is a Cable System? (3.1.1.1) 104         Cable Components (3.1.1.2) 105         What Is DSL? (3.1.1.3) 107         DSL Connections (3.1.1.4) 107         Wireless Connection (3.1.1.5) 109     Select a Broadband Connection (3.1.2) 112         Comparing Broadband Solutions (3.1.2.1) 112 PPPoE (3.2) 113     PPPoE Overview (3.2.1) 113         PPPoE Motivation (3.2.1.1) 113         PPPoE Concepts (3.2.1.2) 114     Implement PPPoE (3.2.2) 115         PPPoE Configuration (3.2.2.1) 115         PPPoE Verification (3.2.2.2) 116         PPPoE Troubleshooting (3.2.2.3) 118         PPPoE Negotiation (3.2.2.4) 118         PPPoE Authentication (3.2.2.5) 119         PPPoE MTU Size (3.2.2.6) 120 VPNs (3.3) 122     Fundamentals of VPNs (3.3.1) 122         Introducing VPNs (3.3.1.1) 123         Benefits of VPNs (3.3.1.2) 124     Types of VPNs (3.3.2) 125         Site-to-Site VPNs (3.3.2.1) 125         Remote-Access VPNs (3.3.2.2) 126         DMVPN (3.3.2.3) 127 GRE (3.4) 128     GRE Overview (3.4.1) 129         GRE Introduction (3.4.1.1) 129         GRE Characteristics (3.4.1.2) 130     Implement GRE (3.4.2) 131         Configure GRE (3.4.2.1) 131         Verify GRE (3.4.2.2) 133         Troubleshoot GRE (3.4.2.3) 134 eBGP (3.5) 136     BGP Overview (3.5.1) 136         IGP and EGP Routing Protocols (3.5.1.1) 137         eBGP and iBGP (3.5.1.2) 138     BGP Design Considerations (3.5.2) 139         When to Use BGP (3.5.2.1) 139         When Not to Use BGP (3.5.2.2) 140         BGP Options (3.5.2.3) 140     eBGP Branch Configuration (3.5.3) 142         Steps to Configure eBGP (3.5.3.1) 142         BGP Sample Configuration (3.5.3.2) 143         Verify eBGP (3.5.3.3) 145 Summary (3.6) 148 Practice 149 Check Your Understanding Questions 150 Chapter 4 Access Control Lists 155 Objectives 155 Key Terms 155 Introduction (4.0.1.1) 156 Standard ACL Operation and Configuration Review (4.1) 156     ACL Operation Overview (4.1.1) 156         ACLs and the Wildcard Mask (4.1.1.1) 156         Applying ACLs to an Interface (4.1.1.2) 158         A TCP Conversation (4.1.1.3) 159         ACL Packet Filtering (4.1.1.4) 160     Types of IPv4 ACLs (4.1.2) 162         Standard and Extended IPv4 ACLs (4.1.2.1) 162         Numbered and Named ACLs (4.1.2.2) 163         Where to Place ACLs (4.1.2.3) 163         Standard ACL Placement Example (4.1.2.4) 165         Extended ACL Placement Example (4.1.2.5) 166     Standard IPv4 ACL Implementation (4.1.3) 167         Configure a Standard IPv4 ACL (4.1.3.1) 167         Apply a Standard IPv4 ACL (4.1.3.2) 169         Standard Named IPv4 ACLs (4.1.3.3) 170         Verify ACLs (4.1.3.4) 171 Extended IPv4 ACLs (4.2) 173     Structure of an Extended IPv4 ACLs (4.2.1) 173         Extended ACLs (4.2.1.1) 173         Filtering Ports and Services (4.2.1.2) 173     Configure Extended IPv4 ACLs (4.2.2) 175         Configuring Extended ACLs (4.2.2.1) 175         Applying Extended ACLs to Interfaces (4.2.2.2) 177         Filtering Traffic with Extended ACLs (4.2.2.3) 178         Creating Extended Named ACLs (4.2.2.4) 180         Verifying Extended ACLs (4.2.2.5) 181         Editing Extended ACLs (4.2.2.6) 182 IPv6 ACLs (4.3) 184     IPv6 ACL Creation (4.3.1) 184         Types of IPv6 ACLs (4.3.1.1) 184         Comparing IPv4 and IPv6 ACLs (4.3.1.2) 185     Configuring IPv6 ACLs (4.3.2) 186         Configuring IPv6 Topology (4.3.2.1) 186         Configuring IPv6 ACLs (4.3.2.2) 188         Applying an IPv6 ACL to an Interface (4.3.2.3) 189         IPv6 ACL Examples (4.3.2.4) 190         Verifying IPv6 ACLs (4.3.2.5) 192 Troubleshoot ACLs (4.4) 194     Processing Packets with ACLs (4.4.1) 194         Inbound and Outbound ACL Logic (4.4.1.1) 194         ACL Logic Operations (4.4.1.2) 195         Standard ACL Decision Process (4.4.1.3) 196         Extended ACL Decision Process (4.4.1.4) 197     Common ACL Errors (4.4.2) 197         Troubleshooting IPv4 ACLs: Example 1 (4.4.2.1) 197         Troubleshooting IPv4 ACLs: Example 2 (4.4.2.2) 198         Troubleshooting IPv4 ACLs: Example 3 (4.4.2.3) 199         Troubleshooting IPv4 ACLs: Example 4 (4.4.2.4) 200         Troubleshooting IPv4 ACLs: Example 5 (4.4.2.5) 200         Troubleshooting IPv6 ACLs: Example 1 (4.4.2.6) 201         Troubleshooting IPv6 ACLs: Example 2 (4.4.2.7) 203         Troubleshooting IPv6 ACLs: Example 3 (4.4.2.8) 205 Summary (4.5) 208 Practice 209 Check Your Understanding Questions 210 Chapter 5 Network Security and Monitoring 215 Objectives 215 Key Terms 215 Introduction (5.0.1.1) 217 LAN Security (5.1) 217     LAN Security Attacks (5.1.1) 218         Common LAN Attacks (5.1.1.1) 218         CDP Reconnaissance Attack (5.1.1.2) 219         Telnet Attacks (5.1.1.3) 220         MAC Address Table Flooding Attack (5.1.1.4) 222         VLAN Attacks (5.1.1.5) 225         DHCP Attacks (5.1.1.6) 226     LAN Security Best Practices (5.1.2) 227         Secure the LAN (5.1.2.1) 227         Mitigate MAC Address Flooding Table Attacks (5.1.2.2) 228         Mitigate VLAN Attacks (5.1.2.3) 229         Mitigate DHCP Attacks (5.1.2.4) 230         Secure Administrative Access Using AAA (5.1.2.5) 231         Secure Device Access Using 802.1X (5.1.2.6) 233 SNMP (5.2) 234     SNMP Operation (5.2.1) 234         Introduction to SNMP (5.2.1.1) 235         SNMP Operation (5.2.1.2) 236         SNMP Agent Traps (5.2.1.3) 237         SNMP Versions (5.2.1.4) 238         Community Strings (5.2.1.5) 241         Management Information Base Object ID (5.2.1.6) 243         SNMPv3 (5.2.1.7) 246     Configuring SNMP (5.2.2) 248         Steps for Configuring SNMP (5.2.2.1) 248         Verifying SNMP Configuration (5.2.2.2) 249         SNMP Best Practices (5.2.2.3) 252         Steps for Configuring SNMPv3 (5.2.2.4) 254         Verifying SNMPv3 Configuration (5.2.2.5) 254 Cisco Switch Port Analyzer (5.3) 255     SPAN Overview (5.3.1) 256         Port Mirroring (5.3.1.1) 256         Analyzing Suspicious Traffic (5.3.1.2) 257         Local SPAN (5.3.1.3) 257         Remote SPAN (5.3.1.4) 259     SPAN Configuration (5.3.2) 260         Configuring Local SPAN (5.3.2.1) 260         Verifying Local SPAN (5.3.2.2) 261     SPAN as a Troubleshooting Tool (5.3.3) 262         Troubleshooting with SPAN Overview (5.3.3.1) 262 Summary (5.4) 264 Practice 264 Check Your Understanding Questions 265 Chapter 6 Quality of Service 269 Objectives 269 Key Terms 269 Introduction (6.0.1.1) 271 QoS Overview (6.1) 271     Network Transmission Quality (6.1.1) 271         Prioritizing Traffic (6.1.1.1) 271         Bandwidth, Congestion, Delay, and Jitter (6.1.1.2) 272         Packet Loss (6.1.1.3) 273     Traffic Characteristics (6.1.2) 275         Network Traffic Trends (6.1.2.1) 275         Voice (6.1.2.2) 276         Video (6.1.2.3) 276         Data (6.1.2.4) 277     Queueing Algorithms (6.1.3) 278         Queuing Overview (6.1.3.1) 279         First-In First-Out (FIFO) (6.1.3.2) 279         Weighted Fair Queuing (WFQ) (6.1.3.3) 280         Class-Based Weighted Fair Queuing (CBWFQ) (6.1.3.4) 281         Low Latency Queuing (LLQ) (6.1.3.5) 282 QoS Mechanisms (6.2) 283     QoS Models (6.2.1) 283         Selecting an Appropriate QoS Policy Model (6.2.1.1) 283         Best Effort (6.2.1.2) 284         Integrated Services (6.2.1.3) 285         Differentiated Services (6.2.1.4) 286     QoS Implementation Techniques (6.2.2) 288         Avoiding Packet Loss (6.2.2.1) 288         QoS Tools (6.2.2.2) 289         Classification and Marking (6.2.2.3) 290         Marking at Layer 2 (6.2.2.4) 291         Marking at Layer 3 (6.2.2.5) 292         Trust Boundaries (6.2.2.6) 295         Congestion Avoidance (6.2.2.7) 296         Shaping and Policing (6.2.2.8) 297 Summary (6.3) 299 Practice 300 Check Your Understanding Questions 300 Chapter 7 Network Evolution 303 Objectives 303 Key Terms 303 Introduction (7.0.1.1) 305 Internet of Things (7.1) 305     IoT Elements (7.1.1) 305         What Is the IoT? (7.1.1.1) 305         The Converged Network and Things (7.1.1.2) 305         Challenges to Connecting Things (7.1.1.3) 306         The Six Pillars of the Cisco IoT System (7.1.1.4) 307     IoT Pillars (7.1.2) 307         The Network Connectivity Pillar (7.1.2.1) 308         The Fog Computing Pillar (7.1.2.2) 308         The Security Pillar (7.1.2.3) 311         Data Analytics Pillar (7.1.2.4) 312         Management and Automation Pillar (7.1.2.5) 313         Application Enablement Platform Pillar (7.1.2.6) 313 Cloud and Virtualization (7.2) 314     Cloud Computing (7.2.1) 314         Cloud Overview (7.2.1.2) 314         Cloud Services (7.2.1.3) 315         Cloud Models (7.2.1.4) 315         Cloud Computing versus Data Center (7.2.1.5) 316     Virtualization (7.2.2) 317         Cloud Computing and Virtualization (7.2.2.1) 317         Dedicated Servers (7.2.2.2) 318         Server Virtualization (7.2.2.3) 319         Advantages of Virtualization (7.2.2.4) 320         Abstraction Layers (7.2.2.5) 321         Type 2 Hypervisors (7.2.2.6) 321     Virtual Network Infrastructure (7.2.3) 323         Type 1 Hypervisors (7.2.3.1) 323         Installing a VM on a Hypervisor (7.2.3.2) 324         Network Virtualization (7.2.3.3) 324 Network Programming (7.3) 326     Software-Defined Networking (7.3.1) 326         Control Plane and Data Plane (7.3.1.1) 326         Virtualizing the Network (7.3.1.2) 327         SDN Architecture (7.3.1.3) 329     Controllers (7.3.2) 331         SDN Controller and Operations (7.3.2.1) 331         Cisco Application Centric Infrastructure (7.3.2.2) 332         Core Components of ACI (7.3.2.3) 332         Spine-Leaf Topology (7.3.2.4) 333         SDN Types (7.3.2.5) 334         APIC-EM Features (7.3.2.6) 336         APIC-EM ACL Analysis (7.3.2.7) 337 Summary (7.4) 340 Practice 341 Check Your Understanding Questions 341 Chapter 8 Network Troubleshooting 347 Objectives 347 Key Terms 347 Introduction (8.0.1.1) 349 Troubleshooting Methodology (8.1) 349     Network Documentation (8.1.1) 349         Documenting the Network (8.1.1.1) 349         Network Topology Diagrams (8.1.1.2) 352         Establishing a Network Baseline (8.1.1.3) 355         Steps to Establish a Network Baseline (8.1.1.4) 355         Measuring Data (8.1.1.5) 358     Troubleshooting Process (8.1.2) 360         General Troubleshooting Procedures (8.1.2.1) 360         Gathering Symptoms (8.1.2.2) 362         Questioning End Users (8.1.2.3) 364     Isolating the Issue Using Layered Models (8.1.3) 365         Using Layered Models for Troubleshooting (8.1.3.1) 365         Troubleshooting Methods (8.1.3.2) 367         Other Troubleshooting Methods (8.1.3.3) 370         Guidelines for Selecting a Troubleshooting Method (8.1.3.4) 371 Troubleshooting Scenarios (8.2) 372     Using IP SLA (8.2.1) 372         IP SLA Concepts (8.2.1.1) 372         IP SLA Configuration (8.2.1.2) 373         Sample IP SLA Configuration (8.2.1.3) 375         Verifying an IP SLA Configuration (8.2.1.4) 376     Troubleshooting Tools (8.2.2) 377         Software Troubleshooting Tools (8.2.2.1) 377         Protocol Analyzers (8.2.2.2) 379         Hardware Troubleshooting Tools (8.2.2.3) 380         Using a Syslog Server for Troubleshooting (8.2.2.4) 385     Symptoms and Causes of Network Troubleshooting (8.2.3) 387         Physical Layer Troubleshooting (8.2.3.1) 387         Data Link Layer Troubleshooting (8.2.3.2) 390         Network Layer Troubleshooting (8.2.3.3) 392         Transport Layer Troubleshooting: ACLs (8.2.3.4) 394         Transport Layer Troubleshooting: NAT for IPv4 (8.2.3.5) 396         Application Layer Troubleshooting (8.2.3.6) 397     Troubleshooting IP Connectivity (8.2.4) 398         Components of Troubleshooting End-to-End Connectivity (8.2.4.1) 398         End-to-End Connectivity Problem Initiates Troubleshooting (8.2.4.2) 400         Step 1: Verify the Physical Layer (8.2.4.3) 402         Step 2: Check for Duplex Mismatches (8.2.4.4) 404         Step 3: Verify Layer 2 and Layer 3 Addressing on the Local Network (8.2.4.5) 406         Step 4: Verify Default Gateway (8.2.4.6) 411         Step 5: Verify Correct Path (8.2.4.7) 415         Step 6: Verify the Transport Layer (8.2.4.8) 418         Step 7: Verify ACLs (8.2.4.9) 420         Step 8: Verify DNS (8.2.4.10) 422 Summary (8.3) 425 Practice 426 Check Your Understanding Questions 427 Appendix A Answers to the “Check Your Understanding” Questions 431 Glossary 443   9781587134326    TOC    8/11/2017  


Best Sellers


Product Details
  • ISBN-13: 9780134760872
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Language: English
  • ISBN-10: 0134760875
  • Publisher Date: 11 Sep 2017
  • Binding: Digital download
  • No of Pages: 512


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Connecting Networks  v6 Companion Guide
Pearson Education (US) -
Connecting Networks v6 Companion Guide
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Connecting Networks v6 Companion Guide

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!