织梦CMS - 轻松建站从此开始!

技术无忧网 - 技术从此无忧 -- 一站式中文IT技术网站 - www.tech51.net

Cisco Certified Design Expert(2)

时间:2008-07-26 22:57来源: 作者: 点击:
Written Exam Blue Print The following blueprint provides general guidelines for the content to be included on the ADVDESIGN beta exam. Topic 1.IP Routing a.Explain route aggregation concepts and techn

Written Exam Blue Print
The following blueprint provides general guidelines for the content to be included on the ADVDESIGN beta exam.

Topic
1.IP Routing
 a.Explain route aggregation concepts and techniques.
  1.Purpose of route aggregation
  2.Scalability and fault isolation
  3.How to Aggregate
 b.Explain the theory and application of network topology abstraction and layering.
  1.Layers and their purpose
  2.Core, aggregation, distribution, access
  3.Purpose of Link State Topology Summarization
  4.What is the purpose of LS topology summarization (not how it works)
  5.Use of Link State Topology Summarization
  6.Where and how to build a flooding domain border
 c.Explain the impact of fault isolation and resiliency on network design.
  1.What is the impact of fault isolation on network reliability
  2.Separating rapid and/or massive changes from the remainder of the network, how to create fault isolation
  3.What is fate sharing, and what is it's impact
  4.What is the impact of redundancy on convergence times
 d.Explain metric based traffic flow and modification.
  1.How to engineer metrics to modify traffic flow
  2."MPLS vs. IGP Traffic Engineering
    a).Modifying IGP Metrics to Engineer Traffic Flow"
     1).Understanding Traffic Flow & Metrics
     2).Third Party Next Hop
     3).Impact on redistribution design
 e.Explain fast convergence techniques and mechanisms.
  1.Layer 2 Down Detection
  2.For all media types
  3.Fast hello timers
  4.OSPF, EIGRP, IS-IS, BGP
  5.Fast SPF Timers
  6.OSPF, IS-IS
  7.Recursion and Convergence
  8.Impact of Third Party Next Hop & BGP recursion
 f.Explain routing protocol operation.
  1.Neighbor Relationships
  2.OSPF, EIGRP, IS-IS, BGP
  3.Determining Loop Free Paths
  4.OSPF, EIGRP, IS-IS, BGP, MPLS Constrained SPF
  5.General Operation
  6.OSPF, EIGRP, IS-IS, BGP; How each protocol operates
  7.Flooding Domains and Stubs
  8.OSPF/IS-IS flooding domains, EIGRP stubs
  9.iBGP Mesh
  10.Next hop mechanisms in BGP, RR's, etc.
 g.Select lower operational costs and complexity.
  1.Route Filters
  2.Simple vs. complex
  3.General
  4.Redistribution
  5.Simple designs, tags, route filters, etc.
 h.Explain transport mechanisms and interaction with routing protocols.
  1.Link Characteristics
  2.Point-to-point, point-to-multipoint, broadcast, etc.
  3.RP Implementation on Various Links
  4.OSPF on each link type
  5.IS-IS on each link type
  6.EIGRP considerations for point-to-multipoint
  7.Topology Characteristics
  8.Full mesh, partial mesh, ring, etc.
  9.RP Implementation on Various Topologies
  10.OSPF/IS-IS flood blocking, etc.
 i.Explain generic routing and addressing concepts.
  1.Policy Based Routing
  2.IPv6 Basics
 j.Explain multicast routing concepts.
  1.General Multicast concepts
2.Tunneling
 a.Explain how tunneling affects end service applications.
  1.Identify and select tunneling technologies appropriate to meet network design objectives.
  2.Identify where and when tunneling parameters must be tuned to optimize the operation of end user applications.
  3.Knowledge of issues related to Layer 2 tunneling: i.e. packet ordering, MTU, etc.
  4.What technologies support Layer 2 and Layer 3 tunneling: L2TPv3, GRE, ATOM, IPsec, etc.
  5.How to implement tunneling given a specific situation: i.e. tunneling Novel IPX over a Layer 3 service provider core, etc.
  6.Understanding of issues related to tunneling L3(IP) in L2(ATM, MPLS)
 b.Explain, recognize, and select tunneling techniques appropriate to the size and scale of the network requirements.
  1.What is the impact of different tunneling technologies on scalability (Selection of a tunneling technology with scalability as a criteria)
  2.How scalability is affected based on type of tunnels (point-to-point, point-to-multipoint)
 c.Explain how L3 routing is affected by tunneling technologies and select L3 routing protocols appropriate to implement tunneling and as passenger traffic in tunnels
  1.How L3 routing is overlaid on a given tunneling technologies
  2.What L3 Routing Protocol would suit a given tunneling technology, topology and scalability
 d.Explain, recognize, and select logical and physical topologies required to meet network design requirements.
  1.What are the best points/nodes in network to initiate and terminate tunnels
  2.Which model would fulfill the requirements (full mesh, partial mesh, hierarchical)
 e.Explain, recognize, and select methods for interconnecting tunneling environments across one or more service provider networks.
  1.Describe different inter-provider tunneling models (i.e. 2547, GRE, IPsec, etc.
 f.Explain, recognize, and select methods for steering traffic with tunnels and into tunnels.
  1.Class Based Tunnel Selection
  2.Traffic Engineering
 g.Explain, recognize, and select methods for providing network failover and redundancy to meet network availability requirements.
  1.Restoration vs. Protection (IGP Fast Convergence, FRR)
  2.Non-stop Forwarding vs. Restoration (at the IP routing layer)
 h.Explain, recognize, and select methods for interconnecting different types of attachment media on tunnel endpoints. Recognize and explain the differences in mapping different L2 technologies onto an L3 tunneling environment.
  1.Interworking
  1.Mapping Layer 2 service onto Layer 3 at the edge
 i.Explain, recognize, and select methods to manage the size and scale of broadcast domains in tunneled L2VPN environments.
  1.VPLS scaling issues
  2.Spanning Tree issues
  3.Broadcast issues across various topologies
3.QoS
 a.Measure and interpret different QoS performance metrics.
  1.Correlate performance metrics to application performance.
  2.Knowledge of the different QoS performance metrics: one-way delay, round-trip delay, jitter, etc.
  3.How to measure and interpret QoS performance metrics
  4.How QoS performance metrics relate to user applications: i.e. impact of QoS metrics on application performance, etc.
 b.Determine why, where and how to implement traffic classification, traffic conditioning and PHB.
  1.Explain how DiffServ QoS tools work.
  2.What DiffServ Terminology means (DS codepoint, Meter, DS ingress/egress node, Remark, DS domain, etc.)
  3.Where to do Traffic Classification (edge and core of DS Domain)
  4.What is Traffic Conditioning and where is it applied? (metering, marking, shaping and policing)
  5.What are traffic profiles and meaning of in/out of profile (Token bucket)
  6.What is the difference between micro-flow and DS behavior aggregate (PHB)
  7.What is the impact on non-DS-compliant nodes within a DS domain on SLAs
  8.What is the issue with MF Classifier and Fragmentation
  9.What is the issue with re-marking and OoO packets
  10.What is the purpose of shapers and droppers
  11.What are different PHB models (e.g. x% minimal resources and proportional remaining link capacity)
  12.What are issues with Different number/type of PHBs in different part of the network
  13.What are the benefits of MF classification on edge and DS classification in the core
  14.Understanding Classification/conditioning/PHB on a per customer basis or few number of templates
  15.What are ways of DS Field Mapping to PHB: 1->1 or N->1 or both
  16.What are tools for PHB Queue management and bounding delay, jitter, packet loss (e.g. TS, WRED, WFQ,etc.)
  17.Understanding QoS provide differentiated services only when there is contention for resources
 c.Explain operations of RSVP.
  1.How RSVP Application does CAC and resource reservation
 d.Explain generic QoS requirements for common application (VoIP, Video, TCP, UDP, control plane traffic).
  1.Explain QoS requirements for control plane traffic.
  2.What are generic VoIP Requirements
  3.What are generic Video Requirements
  4.What are generic TCP Requirements
  5.What are generic UDP Requirements
  6.Understanding of differentiation of control traffic vs data traffic
  7.Where and how to define marking/conditioning of Control Traffic
 e.Explain the techniques to avoid Class starvation when multiple classes are used (EF and non-EF).
  1.How EF with a policer and MDRR/Priority Queue solves the problem
  2.How minimum BW assignment per class or proportional BW assignment among all classes solves the problem
  3.What is the impact of applications' traffic within a given queue with same DS or different DS codepoint
  4.What is the impact of applications' traffic riding on the same node/link in case of failure
 e.Explain the interaction of IP DSCP with other marking schemes (IP Prec, .1P, MPLS EXP, ATM, Frame Relay).
  1.Interaction b/w DSCP and other technologies (understanding/issues/concerns)
    a.Ethernet
    b.ATM
    c.Frame Relay
    d.MPLS
    e.RPR
    f.IP Prec
      1.In case of tunneling layers of marking : Differentiation between tunnel marking and data packet marking
 g.Explain QoS based routing (PBR).
  1.Situations where one has to pick one or two of the following to solve a problem (and understanding of the following)
    a.BGP QoS Propagation
    b.MTR
    c.OER
    d.PBR
    e.CBTS
4.Management
 a.Analyze network conditions and behavior to determine potential degradation or failure conditions.
  1.Recognize conditions from SHOW output for data plane, control plane, hardware, etc.
  2.Recognize conditions from DEBUG output for data plane, control plane, hardware, etc.
  3.Recognize conditions from network behaviors for data plane, control plane, hardware, etc.
  4.Recognize conditions from external monitoring and reporting systems.
 b.Explain the operation and advantages of different management access mechanisms.
  1.How to implement out of band access to all devices in a network
  2.What should be considered when defining secure access to routers
  3.Recognize when and where a design will result in failure.
 c.Explain the operation and use of network management protocols.
  1.Differences between the versions of SNMP.
  2.Knowledge of puts, gets, operations (read, write)
  3.Use of SNMP in SLA management
  4.Identify when use of CMIP is appropriate
  5.Identify when use of TMN is appropriate
 d.Identify network management tools and their uses.
  1.Recognize tools used for SLA management
  2.Identify use of Generic On-Line Diagnostics (GOLD)
  3.Identify and Classify tools for Event Management
  4.State rules for use of Syslog
  5.Knowledge of where to place Netflow Collectors
  6.Identify Services required for flow collection
  7.Recognize Port number for Netflow
  8.Identify services required for event correlation
 e.Identify auditable factors in a network.
  1.Identify auditable factors in a network
 f.Explain traffic management concepts and actions based on traffic statistics.
  1.What is a traffic matrix
  2.When to upgrade a link or re-route traffic
  3.Interpretation of historical data to predict future growth and needs
 g.Recognize configuration management tools and best practices.
  1.Recognize uses of templating tools
  2.Identify best practices for configuration management (i.e. logging config changes, auditing "as running" vs "as   configured," consistent feature application, etc.)
  3.Describe role-based configuration access.
5.Security
 a.Explain the impact of security availability design in the characteristics of a network.
  1.OOB Access
  2.Decoupling
  3.Paul Baran Model
  4.Compartmentalization
 b.Use available tools in a network security design to address identity, monitoring and correlation aspects.
  1.SNMP
  2.Netflow
  3.Syslog
  4.RMON
  5.DNS
  6.Radius/AAA
  7.Full Packet Classifiers
 c.Explain the impact of control plane design decisions on the security of a network; implement security mechanisms to   protect the control plane.
  1.Use and impact of addressing.
  2.Use and impact of area (flooding domain/summary points) placement.
  3.Route/Topology/Link Hiding
  4.Adjacency Protection (MD5, GTSM, etc.)
  5.Route Validation
  6.Route Filtering
  7.Routing Plan
  8.Other routing techniques.
 d.Explain the impact of data plane design decisions on the security of a network; implement security mechanisms to protect the data plane.
  1.Infrastructure Protection
  2.Policy Enforcement (QoS, BCP38)
 e.Prepare and explain security incident preparation and response strategies in a network.
  1.Reaction Tools (Identification and Classification)
  2.Traceback Tools
  3.Remotely-Triggered Black Holes (RTBH) (destination, source, rate limit, etc.)
  4.Sink Holes
  5.Reactive ACLs

Written exams are scheduled and taken at Pearson Vue, Cisco's authorized testing vendor. Please visit the link below for more details and to schedule exams. Be sure to use the same candidate ID number for every exam that you take. If you use a different ID number, you will create a different record in the CCIE database and you will need to contact CCIE support for help in merging the records.

Schedule and Pay for Written Exam

Step Two: CCDE Practical Exam
The CCDE practical exam is still in development, however it will be an eight-hour exam that will test your ability to identify, manage, and create advanced solutions for large scale networks. You must pass the lab within three years of passing the written exam in order to achieve certification.

CCDE Booklist
The following list is a compilation of recommended reading to assist in the preparation for the CCDE qualification exam. It is not required to read all of the books on this list.

Cisco Press Titles:
These titles are available from Cisco Press

Routing TCP/IP, Volume 1, 2nd Edition
Routing TCP/IP, Volume II
MPLS and VPN Architectures, CCIP Edition
MPLS Fundamentals
Advanced MPLS Design and Implementation
Definitive MPLS Network Designs
Fault-Tolerant IP and MPLS Networks
Traffic Engineering with MPLS
QoS for IP/MPLS Networks
Layer 2 VPN Architectures
OSPF Network Design Solutions, 2nd Edition
Optimal Routing Design
BGP Design and Implementation
Top-Down Network Design, 2nd Edition
Troubleshooting IP Routing Protocols
End-to-End QoS Network Design
IP Quality of Service
Network Management Fundamentals
Voice-Enabling the Data Network

(责任编辑:admin)
织梦二维码生成器
顶一下
(0)
0%
踩一下
(0)
0%
------分隔线----------------------------
发表评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
用户名: 验证码:点击我更换图片