Switched Networks Companion Guide
Home > Computing and Information Technology > Computer networking and communications > Networking packages > Switched Networks Companion Guide
Switched Networks Companion Guide

Switched Networks Companion Guide

|
     0     
5
4
3
2
1




Out of Stock


Notify me when this book is in stock
About the Book

Switched Networks Companion Guide is the official supplemental textbook for the Switched Networks course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.   This course describes the architecture, components, and operations of a converged switched network. You will learn about the hierarchical network design model and how to configure a switch for basic and advanced functionality. By the end of this course, you will be able to troubleshoot and resolve common issues with Virtual LANs and inter-VLAN routing in a converged network. You will also develop the knowledge and skills needed to implement a WLAN in a small-to-medium network.   The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.   The book’s features help you focus on important concepts to succeed in this course:   Chapter objectives–Review core concepts by answering the focus questions listed at the beginning of each chapter. Key terms–Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.  Glossary–Consult the comprehensive Glossary more than 300 terms.  Summary of Activities and Labs–Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.  Check Your Understanding–Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.   Related Title: Switched Networks Lab Manual ISBN-10: 1-58713-327-X ISBN-13: 978-1-58713-327-5   How To–Look for this icon to study the steps you need to learn to perform certain tasks. Interactive Activities–Reinforce your understanding of topics with all the different exercises from the online course identified throughout the book with this icon. Videos–Watch the videos embedded within the online course. Packet Tracer Activities–Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters. Hands-on Labs–Work through all the course labs and Class Activities that are included in the course and published in the separate Lab Manual.    

Table of Contents:
Introduction xix Chapter 1 Introduction to Switched Networks 1 Objectives 1 Key Terms 1 Introduction (1.0.1.1) 2 LAN Design (1.1) 3     Converged Networks (1.1.1) 3         Growing Complexity of Networks (1.1.1.1) 3         Elements of a Converged Network (1.1.1.2) 5         Cisco Borderless Network (1.1.1.3) 6         Hierarchy in the Borderless Switched Network (1.1.1.4) 7         Access, Distribution, and Core Layers (1.1.1.5) 9     Switched Networks (1.1.2) 11         Role of Switched Networks (1.1.2.1) 12         Form Factors (1.1.2.2) 13         Traffic Flow (1.1.2.3) 15         Multilayer Switching (1.1.2.4) 16     Switch Features (1.1.3) 17         Port Density (1.1.3.1) 17         Forwarding Rates (1.1.3.2) 19         Power over Ethernet (1.1.3.3) 19         Cisco Catalyst Switch Breakdown (1.1.3.4) 21 The Switched Environment (1.2) 23     Frame Forwarding (1.2.1) 23         Switching as a General Concept in Networking and Telecommunications (1.2.1.1) 23         Dynamically Populating a Switch MAC Address Table (1.2.1.2) 25         Switch Forwarding Methods (1.2.1.3) 28         Store-and-Forward Switching (1.2.1.4) 29         Cut-Through Switching (1.2.1.5) 30     Switching Domains (1.2.2) 31         Collision Domains (1.2.2.1) 32         Broadcast Domains (1.2.2.2) 32         Alleviating Network Congestion (1.2.2.3) 33 Summary (1.3) 35 Practice 37     Class Activities 37     Labs 37     Packet Tracer Activities 37 Check Your Understanding Questions 37 Chapter 2 Basic Switching Concepts and Configuration 41 Objectives 41 Key Terms 41 Introduction (2.0.1.1) 42 Basic Switch Configuration (2.1) 43     Configure a Switch with Initial Settings (2.1.1) 43         Switch Boot Sequence (2.1.1.1) 43         Recovering From a System Crash (2.1.1.2) 44         Switch LED Indicators (2.1.1.3) 45         Preparing for Basic Switch Management (2.1.1.4) 47         Configuring Basic Switch Management Access with IPv4 (2.1.1.5) 47     Configure Switch Ports (2.1.2) 50         Duplex Communication (2.1.2.1) 50         Configure Switch Ports at the Physical Layer (2.1.2.2) 51         Auto-MDIX (2.1.2.3) 52         Verifying Switch Port Configuration (2.1.2.4) 53         Network Access Layer Issues (2.1.2.5) 55         Troubleshooting Network Access Layer Issues (2.1.2.6) 58 Switch Security: Management and Implementation (2.2) 59     Secure Remote Access (2.2.1) 60         SSH Operation (2.2.1.1) 60         Configuring SSH (2.2.1.2) 62         Verifying SSH (2.2.1.3) 64     Security Concerns in LANs (2.2.2) 66         Common Security Attacks: MAC Address Flooding (2.2.2.1) 66         Common Security Attacks: DHCP Spoofing (2.2.2.2) 69         Common Security Attacks: Leveraging CDP (2.2.2.3) 70     Security Best Practices (2.2.3) 72         Best Practices (2.2.3.1) 72         Network Security Tools and Testing (2.2.3.2) 73         Network Security Audits (2.2.3.3) 74     Switch Port Security (2.2.4) 74         Secure Unused Ports (2.2.4.1) 74         DHCP Snooping (2.2.4.2) 75         Port Security: Operation (2.2.4.3) 77         Port Security: Violation Modes (2.2.4.4) 78         Port Security: Configuring (2.2.4.5) 80         Port Security: Verifying (2.2.4.6) 81         Ports in Error-Disabled State (2.2.4.7) 83         Network Time Protocol (NTP) (2.2.4.8) 85 Summary (2.3) 88 Practice 90     Class Activities 90     Labs 90     Packet Tracer Activities 90 Check Your Understanding Questions 91 Chapter 3 VLANs 95 Objectives 95 Key Terms 95 Introduction (3.0.1.1) 96 VLAN Segmentation (3.1) 97     Overview of VLANs (3.1.1) 97         VLAN Definitions (3.1.1.1) 97         Benefits of VLANs (3.1.1.2) 98         Types of VLANs (3.1.1.3) 99         Voice VLANs (3.1.1.4) 101     VLANs in a Multiswitch Environment (3.1.2) 102         VLAN Trunks (3.1.2.1) 102         Controlling Broadcast Domains with VLANs (3.1.2.2) 103         Tagging Ethernet Frames for VLAN Identification (3.1.2.3) 105         Native VLANs and 802.1Q Tagging (3.1.2.4) 106         Voice VLAN Tagging (3.1.2.5) 107 VLAN Implementations (3.2) 109     VLAN Assignment (3.2.1) 109         VLAN Ranges on Catalyst Switches (3.2.1.1) 110         Creating a VLAN (3.2.1.2) 111         Assigning Ports to VLANs (3.2.1.3) 112         Changing VLAN Port Membership (3.2.1.4) 113         Deleting VLANs (3.2.1.5) 116         Verifying VLAN Information (3.2.1.6) 117     VLAN Trunks (3.2.2) 119         Configuring IEEE 802.1Q Trunk Links (3.2.2.1) 119         Resetting the Trunk to the Default State (3.2.2.2) 121         Verifying Trunk Configuration (3.2.2.3) 123     Dynamic Trunking Protocol (3.2.3) 124         Introduction to DTP (3.2.3.1) 125         Negotiated Interface Modes (3.2.3.2) 126     Troubleshoot VLANs and Trunks (3.2.4) 128         IP Addressing Issues with VLAN (3.2.4.1) 128         Missing VLANs (3.2.4.2) 129         Introduction to Troubleshooting Trunks (3.2.4.3) 131         Common Problems with Trunks (3.2.4.4) 132         Trunk Mode Mismatches (3.2.4.5) 133         Incorrect VLAN List (3.2.4.6) 135 VLAN Security and Design (3.3) 138     Attacks on VLANs (3.3.1) 138         Switch Spoofing Attack (3.3.1.1) 138         Double-Tagging Attack (3.3.1.2) 139         PVLAN Edge (3.3.1.3) 140     VLAN Best Practices (3.3.2) 142         VLAN Design Guidelines (3.3.2.1) 142 Summary (3.4) 144 Practice 146     Class Activities 146     Labs 146     Packet Tracer Activities 146 Check Your Understanding Questions 147 Chapter 4 LAN Redundancy 151 Objectives 151 Key Terms 151 Introduction (4.0.1.1) 153 Spanning Tree Concepts (4.1) 154     STP Operation (4.1.2) 154         Redundancy at OSI Layers 1 and 2 (4.1.1.1) 154         Issues with Layer 1 Redundancy: MAC Database Instability (4.1.1.2) 156         Issues with Layer 1 Redundancy: Broadcast Storms (4.1.1.3) 161         Issues with Layer 1 Redundancy: Duplicate Unicast Frames (4.1.1.4) 161     STP Operation (4.1.2) 162         Spanning Tree Algorithm: Introduction (4.1.2.1) 162         Spanning Tree Algorithm: Port Roles (4.1.2.2) 165         Spanning Tree Algorithm: Root Bridge (4.1.2.3) 167         Spanning Tree Algorithm: Path Cost (4.1.2.4) 168         802.1D BPDU Frame Format (4.1.2.5) 171         BPDU Propagation and Process (4.1.2.6) 173         Extended System ID (4.1.2.7) 178 Varieties of Spanning Tree Protocols (4.2) 182     Overview (4.2.1) 182         List of Spanning Tree Protocols (4.2.1.1) 182         Characteristics of the Spanning Tree Protocols (4.2.1.2) 183     PVST+ (4.2.2) 185         Overview of PVST+ (4.2.2.1) 185         Port States and PVST+ Operation (4.2.2.2) 186         Extended System ID and PVST+ Operation (4.2.2.3) 188         Rapid PVST+ (4.2.3) 189         Overview of Rapid PVST+ (4.2.3.1) 189         RSTP BPDU (4.2.3.2) 190         Edge Ports (4.2.3.3) 192         Link Types (4.2.3.4) 192 Spanning Tree Configuration (4.3) 193     PVST+ Configuration (4.3.1) 193         Catalyst 2960 Default Configuration (4.3.1.1) 194         Configuring and Verifying the Bridge ID (4.3.1.2) 194         PortFast and BPDU Guard (4.3.1.3) 196         PVST+ Load Balancing (4.3.1.4) 199     Rapid PVST+ Configuration (4.3.2) 202         Spanning Tree Mode (4.3.2.1) 202     STP Configuration Issues (4.3.3) 205         Analyzing the STP Topology (4.3.3.1) 205         Expected Topology Versus Actual Topology (4.3.3.2) 206         Overview of Spanning Tree Status (4.3.3.3) 207         Spanning Tree Failure Consequences (4.3.3.4) 207         Repairing a Spanning Tree Problem (4.3.3.5) 210 First Hop Redundancy Protocols (4.4) 210     Concept of First Hop Redundancy Protocols (4.4.1) 211         Default Gateway Limitations (4.4.1.1) 211         Router Redundancy (4.4.1.2) 212         Steps for Router Failover (4.4.1.3) 213     Varieties of First Hop Redundancy Protocols (4.4.2) 214         First Hop Redundancy Protocols (4.4.2.1) 214     FHRP Verification (4.4.3) 215         HSRP Verification (4.4.3.1) 216         GLBP Verification (4.4.3.2) 217 Summary (4.5) 220 Practice 221     Class Activities 221     Labs 221     Packet Tracer Activities 221 Check Your Understanding Questions 222 Chapter 5 Link Aggregation 227 Objectives 227 Key Terms 227 Introduction (5.0.1.1) 228 Link Aggregation Concepts (5.1) 228     Link Aggregation (5.1.1) 229         Introduction to Link Aggregation (5.1.1.1) 229         Advantages of EtherChannel (5.1.1.2) 230     EtherChannel Operation (5.1.2) 231         Implementation Restrictions (5.1.2.1) 231         Port Aggregation Protocol (5.1.2.2) 232         Link Aggregation Control Protocol (5.1.2.3) 234 Link Aggregation Configuration (5.2) 235     Configuring EtherChannel (5.2.1) 235         Configuration Guidelines (5.2.1.1) 236         Configuring Interfaces (5.2.1.2) 237     Verifying and Troubleshooting EtherChannel (5.2.2) 238         Verifying EtherChannel (5.2.2.1) 238         Troubleshooting EtherChannel (5.2.2.2) 241 Summary (5.3) 245 Practice 246     Class Activities 246     Labs 246     Packet Tracer Activities 246 Check Your Understanding Questions 247 Chapter 6 Inter-VLAN Routing 251 Objectives 251 Key Terms 251 Introduction (6.0.1.1) 252 Inter-VLAN Routing Configuration (6.1) 252     Inter-VLAN Routing Operation (6.1.1) 253         What Is Inter-VLAN Routing? (6.1.1.1) 253         Legacy Inter-VLAN Routing (6.1.1.2) 254         Router-on-a-Stick Inter-VLAN Routing (6.1.1.3) 255         Multilayer Switch Inter-VLAN Routing (6.1.1.4) 256     Configure Legacy Inter-VLAN Routing (6.1.2) 257         Configure Legacy Inter-VLAN Routing: Preparation (6.1.2.1) 257         Configure Legacy Inter-VLAN Routing: Switch Configuration (6.1.2.2) 259         Configure Legacy Inter-VLAN Routing: Router Interface Configuration (6.1.2.3) 260     Configure Router-on-a-Stick Inter-VLAN Routing (6.1.3) 262         Configure Router-on-a-Stick: Preparation (6.1.3.1) 262         Configure Router-on-a-Stick: Switch Configuration (6.1.3.2) 264         Configure Router-on-a-Stick: Router Subinterface Configuration (6.1.3.3) 265         Configure Router-on-a-Stick: Verifying Subinterfaces (6.1.3.4) 266         Configure Router-on-a-Stick: Verifying Routing (6.1.3.5) 268 Troubleshoot Inter-VLAN Routing (6.2) 270     Inter-VLAN Configuration Issues (6.2.1) 270         Switch Port Issues (6.2.1.1) 270         Verify Switch Configuration (6.2.1.2) 272         Interface Issues (6.2.1.3) 273         Verify Router Configuration (6.2.1.4) 274     IP Addressing Issues (6.2.2) 276         Errors with IP Addresses and Subnet Masks (6.2.2.1) 276         Verifying IP Address and Subnet Mask Configuration         Issues (6.2.2.2) 278 Layer 3 Switching (6.3) 280     Layer 3 Switching Operation and Configuration (6.3.1) 280         Introduction to Layer 3 Switching (6.3.1.1) 280         Inter-VLAN Routing with Switch Virtual Interfaces (6.3.1.2) 282         Inter-VLAN Routing with Routed Ports (6.3.1.4) 284         Configuring Static Routes on a Catalyst 2960 Switch (6.3.1.5) 285     Troubleshoot Layer 3 Switching (6.3.2) 291         Layer 3 Switch Configuration Issues (6.3.2.1) 291         Example: Troubleshooting Layer 3 Switching (6.3.2.2) 292 Summary (6.4) 295 Practice 296     Class Activities 296     Labs 296     Packet Tracer Activities 296 Check Your Understanding Questions 297 Chapter 7 DHCP 303 Objectives 303 Key Terms 303 Introduction (7.0.1.1) 305 Dynamic Host Configuration Protocol v4 (7.1) 306     DHCPv4 Operation (7.1.1) 306         Introducing DHCPv4 (7.1.1.1) 306         DHCPv4 Operation (7.1.1.2) 307         DHCPv4 Message Format (7.1.1.3) 311         DHCPv4 Discover and Offer Messages (7.1.1.4) 313     Configuring a Basic DHCPv4 Server (7.1.2) 315         Configuring a Basic DHCPv4 Server (7.1.2.1) 315         Verifying DHCPv4 (7.1.2.2) 318         DHCPv4 Relay (7.1.2.3) 322     Configure DHCPv4 Client (7.1.3) 325         Configuring a Router as DHCPv4 Client (7.1.3.1) 325         Configuring a SOHO Router as a DHCPv4 Client (7.1.3.2) 326     Troubleshoot DHCPv4 (7.1.4) 327         Troubleshooting Tasks (7.1.4.1) 327         Verify Router DHCPv4 Configuration (7.1.4.2) 329         Debugging DHCPv4 (7.1.4.3) 330 Dynamic Host Configuration Protocol for IPv6 (DHCPv6) (7.2) 331     SLAAC and DHCPv6 (7.2.1) 331         Stateless Address Autoconfiguration (SLAAC) (7.2.1.1) 331         SLAAC Operation (7.2.1.2) 333         SLAAC and DHCPv6 (7.2.1.3) 335         SLAAC Option (7.2.1.4) 336         Stateless DHCPv6 Option (7.2.1.5) 337         Stateful DHCPv6 Option (7.2.1.6) 338         DHCPv6 Operations (7.2.1.7) 339     Stateless DHCPv6 (7.2.2) 342         Configuring a Router as a Stateless DHCPv6 Server (7.2.2.1) 342         Configuring a Router as a Stateless DHCPv6 Client (7.2.2.2) 344         Verifying Stateless DHCPv6 (7.2.2.3) 344     Stateful DHCPv6 Server (7.2.3) 346         Configuring a Router as a Stateful DHCPv6 Server (7.2.3.1) 346         Configuring a Router as a Stateful DHCPv6 Client (7.2.3.2) 349         Verifying Stateful DHCPv6 (7.2.3.3) 349         Configuring a Router as a DHCPv6 Relay Agent (7.2.3.4) 351     Troubleshoot DHCPv6 (7.2.4) 352         Troubleshooting Tasks (7.2.4.1) 353         Verify Router DHCPv6 Configuration (7.2.4.2) 354         Debugging DHCPv6 (7.2.4.3) 355 Summary (7.3) 357 Practice 359     Class Activities 359     Labs 359     Packet Tracer Activities 359 Check Your Understanding Questions 360 Chapter 8 Wireless LANs 363 Objectives 363 Key Terms 363 Introduction (8.0.1.1) 367 Wireless Concepts (8.1) 367     Introduction to Wireless (8.1.1) 367         Supporting Mobility (8.1.1.1) 368         Benefits of Wireless (8.1.1.2) 368         Wireless Technologies (8.1.1.3) 369         Radio Frequencies (8.1.1.4) 370         802.11 Standards (8.1.1.5) 371         Wi-Fi Certification (8.1.1.6) 373         Comparing WLANs to a LAN (8.1.1.7) 375     Components of WLANs (8.1.2) 376         Wireless NICs (8.1.2.1) 376         Wireless Home Router (8.1.2.2) 377         Business Wireless Solutions (8.1.2.3) 379         Wireless Access Points (8.1.2.4) 380         Small Wireless Deployment Solutions (8.1.2.5) 382         Large Wireless Deployment Solutions (8.1.2.6) 385         Large Wireless Deployment Solutions, Cont. (8.1.2.7) 387         Wireless Antennas (8.1.2.8) 389     802.11 WLAN Topologies (8.1.3) 391         802.11 Wireless Topology Modes (8.1.3.1) 391         Ad Hoc Mode (8.1.3.2) 392         Infrastructure Mode (8.1.3.3) 393 Wireless LAN Operations (8.2) 395     802.11 Frame Structure (8.2.1) 395         Wireless 802.11 Frame (8.2.1.1) 395         Frame Control Field (8.2.1.2) 397         Wireless Frame Type (8.2.1.3) 399         Management Frames (8.2.1.4) 400         Control Frames (8.2.1.5) 402     Wireless Operation (8.2.2) 403         Carrier Sense Multiple Access with Collision Avoidance (8.2.2.1) 404         Wireless Clients and Access Point Association (8.2.2.2) 405         Association Parameters (8.2.2.3) 406         Discovering APs (8.2.2.4) 409         Authentication (8.2.2.5) 411     Channel Management (8.2.3) 413         Frequency Channel Saturation (8.2.3.1) 413         Selecting Channels (8.2.3.2) 415         Planning a WLAN Deployment (8.2.3.3) 418 Wireless LAN Security (8.3) 420     WLAN Threats (8.3.1) 420         Securing Wireless (8.3.1.1) 420         DoS Attack (8.3.1.2) 422         Management Frame DoS Attacks (8.3.1.3) 423         Rogue Access Points (8.3.1.4) 425         Man-in-the-Middle Attack (8.3.1.5) 426     Securing WLANs (8.3.2) 428         Wireless Security Overview (8.3.2.1) 428         Shared Key Authentication Methods (8.3.2.2) 430         Encryption Methods (8.3.2.3) 432         Authenticating a Home User (8.3.2.4) 432         Authentication in the Enterprise (8.3.2.5) 434 Wireless LAN Configuration (8.4) 435     Configure a Wireless Router (8.4.1) 435         Configuring a Wireless Router (8.4.1.1) 435         Setting Up and Installing Initial Linksys EA6500 (8.4.1.2) 437         Configuring the Linksys Smart Wi-Fi Home Page (8.4.1.3) 441         Smart Wi-Fi Settings (8.4.1.4) 443         Smart Wi-Fi Tools (8.4.1.5) 446         Backing Up a Configuration (8.4.1.6) 450     Configuring Wireless Clients (8.4.2) 452         Connecting Wireless Clients (8.4.2.1) 452     Troubleshoot WLAN Issues (8.4.3) 453         Troubleshooting Approaches (8.4.3.1) 453         Wireless Client Not Connecting (8.4.3.2) 455         Troubleshooting When the Network Is Slow (8.4.3.3) 456         Updating Firmware (8.4.3.4) 458 Summary (8.5) 460 Practice 461     Class Activities 461     Labs 462     Packet Tracer Activities 462 Check Your Understanding Questions 462 Appendix A Answers to “Check Your Understanding” Questions 465 Glossary 477 9781587133299, TOC, 4/14/14


Best Sellers


Product Details
  • ISBN-13: 9780133476446
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Language: English
  • Weight: 1 gr
  • ISBN-10: 0133476448
  • Publisher Date: 18 Apr 2014
  • Binding: Digital download
  • No of Pages: 552


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Switched Networks Companion Guide
Pearson Education (US) -
Switched Networks Companion Guide
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Switched Networks Companion Guide

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!