Muutke küpsiste eelistusi

E-raamat: CCDE Study Guide

  • Formaat: 616 pages
  • Ilmumisaeg: 01-Oct-2015
  • Kirjastus: Cisco Press
  • Keel: eng
  • ISBN-13: 9780134135830
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 63,17 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 616 pages
  • Ilmumisaeg: 01-Oct-2015
  • Kirjastus: Cisco Press
  • Keel: eng
  • ISBN-13: 9780134135830
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The authoritative, business-driven study resource for the tough CCDE Practical Exam

CCDE Study Guide is written and reviewed by CCDE engineers and helps you to both improve your design skills and to study for and pass the CCDE exam. Network design is an art, combining broad technology knowledge and experience. This book covers a broad number of technologies, protocols and design options, and considerations that can bring these aspects together and show how they can be used and thought about based on different requirements and business goals. Therefore, this book does not attempt to teach foundational technology knowledge, instead each section:





Highlights, discusses, and compares the limitations and advantages of the different design options in terms of scalability, performance, flexibility, availability, complexity, security, and so on to simplify the job and help you understand what technology, protocol, or design options should be selected and why, based on the business or application requirements or to fix a broken design that need to be optimized Covers design aspects of different protocols and technologies, and how they map with different requirements Highlights drivers toward using these technologies whether it is intended for enterprise or service provider network, depending on the topic and technology

Using a business-driven approach, CCDE Study Guide helps you analyze business and technical requirements and develop network designs that are based on these business needs and goals, taking into account both the technical and non-technical design constraints. The various scenario-based design examples discussed in this book will help you craft design approaches and requirements analysis on such topics as converged enterprise network architectures, service provider network architectures, and data centers. The book also addresses high availability, IPv6, multicast, QoS, security, and network management design considerations, presenting you with an in-depth evaluation of a broad range of technologies and environments.

Whether you are preparing for the CCDE exam or simply wish to gain better insight into the art of network design in a variety of environments, this book helps you learn how to think like an expert network designer as well as analyze and compare the different design options, principles, and protocols based on different design requirements.





Master a business-driven approach to designing enterprise, service provider, and data center networks Analyze the design impact of business, functional, and application requirements Learn from scenario-based examples, including converged enterprise networks, service provider networks, and cloud-based data centers Overcome design limitations and fix broken designs Review design options and considerations related to Layer 2 and Layer 3 control plane protocols Build designs that accommodate new services and applications Consider design options for modern campus networks, including network virtualization Design WAN edge and Internet edge blocks in enterprise networks Review the architectural elements of a service provider-grade network Plan MPLS VPN network environments, including L2VPN and L3VPN Interconnect different networks or routing domains Design traditional, virtualized, and cloud-based data center networks Interconnect dispersed data center networks to protect business continuity Achieve appropriate levels of operational uptime and network resiliency Integrate IPv6, multicast, QoS, security, and network management into your designs
Introduction xx
Part I Business-Driven Strategic Network Design 1(30)
Chapter 1 Network Design Requirements: Analysis and Design Principles
3(28)
Design Scope
4(1)
Business Requirements
5(4)
Business Continuity
6(1)
Elasticity to Support the Strategic Business Trends
7(1)
IT as a "Business Innovation" Enabler
8(1)
The Nature of the Business
9(1)
Business Priorities
9(1)
Functional Requirements
9(1)
Technical Requirements
10(1)
Application Requirements
10(2)
Design Constraints
12(1)
Crafting the Design Requirements
13(3)
Planning
16(3)
Decision Tree
17(1)
Decision Matrix
17(1)
Planning Approaches
18(1)
Strategic Balance
18(1)
Network Design Principles
19(10)
Reliability and Resiliency
19(1)
Modularity
20(1)
Reliable and Manageable Scalability
21(1)
Fault Isolation and Simplicity
22(1)
Hierarchy
23(2)
Responsiveness
25(1)
Holistic Design Approach
25(1)
Physical Layout Considerations
26(3)
No Gold Plating
29(1)
Summary
29(2)
Part II Next Generation - Converged Enterprise Network Architectures 31(172)
Chapter 2 Enterprise Layer 2 and Layer 3 Design
35(84)
Enterprise Layer 2 LAN Design Considerations
35(8)
Spanning Tree Protocol
36(1)
VLANs and Trunking
37(1)
Link Aggregation
37(1)
First Hop Redundancy Protocol and Spanning Tree
38(2)
Enterprise Layer 2 LAN Common Design Options
40(1)
Layer 2 Design Models: STP Based (Classical Model)
40(1)
Layer 2 Design Model: Switch Clustering Based (Virtual Switch)
41(1)
Layer 2 Design Model: Daisy-Chained Access Switches
42(1)
Layer 2 LAN Design Recommendations
43(1)
Enterprise Layer 3 Routing Design Considerations
43(17)
IP Routing and Forwarding Concept Review
43(2)
Link-State Routing Protocol Design Considerations
45(1)
Link-State over Hub-and-Spoke Topology
45(3)
Link-State over Full-Mesh Topology
48(1)
OSPF Area Types
49(4)
OSPF Versus IS-IS
53(1)
Further Reading
53(1)
EIGRP Design Considerations
54(1)
EIGRP: Hub and Spoke
55(1)
EIGRP Stub Route Leaking: Hub-and-Spoke Topology
56(2)
EIGRP: Ring Topology
58(1)
EIGRP: Full-Mesh Topology
58(1)
EIGRP Route Propagation Considerations
59(1)
Further Reading
60(1)
Hiding Topology and Reachability Information Design Considerations
60(23)
IGP Flooding Domains Design Considerations
62(1)
Link-State Flooding Domain Structure
63(6)
EIGRP Flooding Domains Structure
69(1)
Routing Domain Logical Separation
70(6)
Route Summarization
76(2)
Summary Black Holes
78(2)
Suboptimal Routing
80(3)
IGP Traffic Engineering and Path Selection: Summary
83(2)
OSPF
83(1)
IS-IS
84(1)
EIGRP
84(1)
Summary of IGP Characteristics
84(1)
BGP Design Considerations
85(22)
Interdomain Routing
86(2)
BGP Attributes and Path Selection
88(1)
BGP as the Enterprise Core Routing Protocol
89(1)
Enterprise Core Routing Design Models with BGP
90(4)
BGP Shortest Path over the Enterprise Core
94(2)
BGP Scalability Design Options and Considerations
96(1)
BGP Route Reflection
96(6)
Update Grouping
102(1)
BGP Confederation
103(2)
Confederation Versus Route Reflection
105(1)
Further Reading
106(1)
Route Redistribution Design Considerations
107(7)
Single Redistribution Boundary Point
107(1)
Multiple Redistribution Boundary Points
108(1)
Metric Transformation
109(1)
Administrative Distance
110(1)
Route Filtering Versus Route Tagging with Filtering
110(4)
Enterprise Routing Design Recommendations
114(3)
Determining Which Routing Protocol to Use
115(2)
Summary
117(2)
Chapter 3 Enterprise Campus Architecture Design
119(24)
Enterprise Campus: Hierarchical Design Models
119(2)
Three-Tier Model
120(1)
Two-Tier Model
120(1)
Enterprise Campus: Modularity
121(2)
When Is the Core Block Required?
122(1)
Access-Distribution Design Model
123(3)
Enterprise Campus: Layer 3 Routing Design Considerations
126(2)
EIGRP Versus Link State as a Campus IGP
128(13)
Enterprise Campus Network Virtualization
129(1)
Drivers to Consider Network Virtualization
129(2)
Network Virtualization Design Elements
131(1)
Enterprise Network Virtualization Deployment Models
132(1)
Device Virtualization
133(1)
Path Isolation
133(3)
Service Virtualization
136(5)
Summary
141(1)
Further Reading
141(2)
Chapter 4 Enterprise Edge Architecture Design
143(60)
Enterprise WAN Module
143(27)
WAN Transports: Overview
144(1)
Modem WAN Transports (Layer 2 Versus Layer 3)
145(1)
Layer 2 MPLS-Based WAN
146(2)
Layer 3 MPLS-Based WAN
148(3)
Internet as WAN Transport
151(1)
Internet as WAN Transport Advantages and Limitations
152(1)
WAN Transport Models Comparison
153(2)
WAN Module Design Options and Considerations
155(1)
Design Hierarchy of the Enterprise WAN Module
155(1)
WAN Module Access to Aggregation Layer Design Options
156(2)
WAN Edge Connectivity Design Options
158(2)
Single WAN Provider Versus Dual Providers
160(1)
Remote Site (Branch) WAN Design Considerations
161(3)
Internet as WAN Transport (DMVPN Based)
164(2)
Enterprise WAN Module Design Options
166(1)
Option 1: Small to Medium
166(1)
Option 2: Medium to Large
167(2)
Option 3: Large to Very Large
169(1)
WAN Virtualization and Overlays Design Considerations and Techniques
170(14)
WAN Virtualization
172(2)
Over-the-Top WAN Virtualization Design Options (Service Provider Coordinated/Dependent)
174(2)
Over-the-Top WAN Virtualization Design Options (Service Provider Independent)
176(5)
Comparison of Enterprise WAN Transport Virtualization Techniques
181(2)
WAN Virtualization Design Options Decision Tree
183(1)
Enterprise WAN Migration to MPLS VPN Considerations
184(4)
Migrating from Legacy WAN to MPLS L3VPN WAN Scenario
184(4)
Enterprise Internet Edge Design Considerations
188(14)
Internet Edge Architecture Overview
188(2)
Enterprise Multihomed Internet Design Considerations
190(1)
Multihoming Design Concept and Drivers
190(2)
BGP over Multihomed Internet Edge Planning Recommendations
192(1)
BGP Policy Control Attributes for Multihoming
192(2)
Common Internet Multihoming Traffic Engineering Techniques over BGP
194(1)
Scenario 1: Active-Standby
194(5)
Asymmetrical Routing with Multihoming (Issue and Solution)
199(3)
Summary
202(1)
Part III Service Provider Networks Design and Architectures 203(158)
Chapter 5 Service Provider Network Architecture Design
205(40)
Service Provider Network Architecture Building Blocks
207(5)
Point of Presence
208(3)
Service Provider Network Core
211(1)
Service Provider Control Plane Logical Architectures
212(15)
IGP in Service Provider Networks
212(1)
BGP in Service Provider Networks
213(1)
BGP Route Aggregation (ISP Perspective)
213(4)
Hot- and Cold-Potato Routing (SP Perspective)
217(6)
Multiprotocol Label Switching
223(2)
MPLS Label-Switched Path
225(1)
MPLS Deployment Modes
225(1)
Multiprotocol BGP
226(1)
MPLS Traffic Engineering
227(16)
Business and Technical Drivers
227(4)
MPLS-TE Planning
231(1)
MPLS-TE Strategic Planning Approach
231(1)
MPLS-TE Tactical Planning Approach
232(1)
MPLS-TE Design Considerations
233(1)
Constrained Path Calculation
234(3)
MPS-TE Tunnel Placement
237(2)
Routing Domains
239(2)
Forwarding Traffic Via the TE Tunnel
241(2)
Summary
243(1)
Further Reading
244(1)
Chapter 6 Service Provider MPLS VPN Services Design
245(84)
MPLS VPN (L3VPN)
245(37)
MPLS L3VPN Architecture Components
246(2)
L3VPN Control Plane Components
248(3)
L3VPN Forwarding Plane
251(2)
L3VPN Design Considerations
253(1)
Load Sharing for Multihomed L3VPN CE
253(1)
MPLS L3VPN Topologies
254(8)
MP-BGP VPN Internet Routing
262(2)
PE-CE L3VPN Routing Design
264(1)
PE-CE Routing Design Considerations
265(1)
PE-CE Routing Protocol Selection
266(1)
PE-CE Design Options and Recommendations
266(16)
Layer 2 MPLS VPN (L2VPN)
282(33)
IP NGN Carrier Ethernet
284(3)
Virtual Private Wire Service Design Considerations
287(1)
Transport Models
287(2)
VPWS Control Plane
289(2)
Virtual Private LAN Service Design Considerations
291(1)
VPLS Architecture Building Blocks
292(1)
VPLS Functional Components
292(1)
Virtual Switching Instance
293(1)
VPLS Control Plane
293(1)
VPLS Design Models
294(4)
Ethernet Access Model
298(1)
MPLS Access Model
299(2)
H-VPLS with Provider Backbone Bridging
301(6)
EVPN Design Model (Next-Generation MPLS L2VPN)
307(4)
EVPN BGP Routes and Extended Communities
311(3)
Final Thoughts: L2VPN Business Value and Direction
314(1)
Service Provider Control Plane Scalability
315(12)
IGP Scalability Considerations
316(2)
Route Reflection Design Options in SP Networks
318(1)
Provider Routers as RRs for MPLS-VPN
319(1)
Separate RR for MPLS-VPN and IPv4/v6
319(1)
Separate RR per Service (MPLS-VPN and IPv4/v6)
320(1)
Hierarchical RR
321(2)
Partitioned MPLS-VPN RR
323(2)
Hierarchical LSP (Unified MPLS)
325(2)
Summary
327(1)
Further Reading
327(2)
Chapter 7 Multi-AS Service Provider Network Design
329(32)
Inter-AS Design Options and Considerations
330(14)
Inter-AS Option A: Back-to-Back VRF (VRF-to-VRF)
330(1)
Inter-AS Option B: ASBR to ASBR with MP-eBGP Approach
331(1)
Option B-1: Next-Hop-Self Approach
331(1)
Option B-2: Redistribute Connected Approach
332(2)
Option B-3: Multi hop MP-eBGP Approach
334(1)
Inter-AS Option C: Multihop MP-eBGP Between RR
335(1)
Inter-AS Option D
335(1)
Inter-AS IPv6 VPN
336(1)
Inter-AS MPLS-TE
337(1)
Inter-AS L2VPN
338(5)
Inter-AS QoS
343(1)
Comparison of Inter-AS Connectivity Options
344(2)
Carrier Supporting Carrier
346(7)
Non-MPLS Customer over MPLS VPN Carrier
346(1)
MPLS Customer over MPLS VPN Carrier
347(1)
MPLS VPN Customer over MPLS VPN Carrier
348(1)
MPLS VPN Customer over MPLS Carrier
348(1)
MPLS VPN Customer over IP-Only Carrier
349(4)
Acquisition of an MPLS-L3VPN Service Provider Design Scenario
353(5)
Background Information
353(1)
Design Requirements
353(1)
Available Interconnection Options
354(1)
Inter-AS Connectivity Model Selection
355(1)
Proposed Solution
356(2)
Network Merger implementation Plan
358(1)
Summary
358(3)
Part IV Data Center Networks Design 361(68)
Chapter 8 Data Center Networks Design
363(66)
Traditional Data Center Network Architecture
364(3)
STP-Based Data Center Network Architecture
365(2)
mLAG-Based Data Center Network Architecture
367(1)
Next-Generation Data Center Network Design
367(20)
Data Center Virtualization and Cloud-Based Services Overview
368(1)
Drivers Toward New Fabric-Based Data Center Network Architectures
369(3)
Modern Data Center Network Architectures and Overlays
372(2)
Clos Architecture
374(2)
Clos Transport Protocols
376(1)
MAC-in-MAC
377(3)
MAC-in-IP
380(3)
MPLS Based
383(4)
Comparison of Data Center Network Architectures
387(2)
Data Center Interconnect
389(39)
DCI Building Blocks
392(1)
DCI Connectivity Options
393(1)
Routed DCI
394(4)
Layer 2 DCI
398(3)
Dark Fiber-Based DCI
401(2)
Layer 2 DCI over ME Transport
403(1)
TRILL-FabricPath-Based DCI
404(2)
Overlay Transport Virtualization
406(2)
VxLAN-Based DCI
408(3)
DCI Design Considerations
411(3)
SAN Extension
414(3)
DCI Path Optimization Techniques
417(4)
DNS Based
421(1)
Route Health Injection
422(1)
Locator/ID Separation Protocol
423(5)
Summary
428(1)
Further Reading
428(1)
Part V High Availability 429(44)
Chapter 9 Network High-Availability Design
431(42)
Fault Tolerance
434(2)
Fate Sharing and Fault Domains
436(2)
Network Resiliency Design Considerations
438(31)
Device-Level Resiliency
441(2)
Protocol-Level Resiliency
443(1)
Network Restoration
444(10)
Network Protection Approach
454(12)
BGP FRR
466(3)
Summary
469(1)
Further Reading
470(3)
Part VI Other Network Technologies and Services 473(104)
Chapter 10 Design of Other Network Technologies and Services
475(102)
IPv6 Design Considerations
475(17)
IPv6 Business and Technical Drivers
476(1)
IPv6 Addressing Types (Review)
477(1)
Migration and Integration of IPv4 and IPv6
478(1)
Discovery Phase
479(1)
Solution Assessment and Planning
479(5)
Detailed Design
484(4)
Deployment, Monitoring, and Optimization
488(1)
Transition to IPv6: Scenario
488(2)
Network Requirements Analysis
490(1)
Design Approach
490(2)
Further Reading
492(1)
IP Multicast Design Considerations
492(29)
Enterprise Multicast Design Options and Considerations
494(1)
Application Characteristic
494(1)
Multicast IP Address Mapping into Ethernet MAC Address
494(3)
Multicast Layer 3 Routing
497(9)
Multicast BGP
506(1)
Multicast Source Discovery Protocol
507(2)
Embedded RP
509(1)
SP Multicast Design Options and Considerations
510(1)
MVPN (Draft-Rosen Model)
510(1)
MVPN - Label Switch Multicast
511(1)
Next-Generation MVPN
512(2)
Multicast Resiliency Design Considerations
514(1)
Anycast RP
514(1)
Anycast-RP Using PIM
515(1)
Phantom RP
516(1)
Live-Live Streaming
517(2)
First Hop Redundancy Protocol-Aware PIM
519(1)
Final Thoughts on IP Multicast Design
520(1)
Further Reading
520(1)
QoS Design Considerations
521(29)
QoS High Level Design: Business-Driven Approach
521(2)
QoS Architecture
523(1)
QoS DiffSery Architecture and Toolset
523(2)
Traffic Classification and Marking
525(3)
Traffic Profiling and Congestion Management
528(3)
Congestion Avoidance (Active Queue Management)
531(1)
Admission Control
531(1)
QoS Design Strategy
532(5)
Enterprise QoS Design Considerations
537(1)
Enterprise Campus
537(1)
Enterprise Edge
538(5)
Service Provider QoS Design
543(1)
Traffic Marking Strategy
543(4)
DiffSery MPLS-TE (DS-TE)
547(2)
Further Reading
549(1)
Network Security Design
550(19)
Network Security Design Fundamentals
551(1)
Top-Down Design
551(1)
Security Policy Considerations
551(1)
Holistic Approach Considerations
552(1)
Divide-and-Conquer Approach
553(2)
Security Triad Principle (Confidentiality, Integrity, and Availability)
555(1)
Network Infrastructure Security Considerations
556(1)
Network Device Level Security
557(4)
Layer 2 Security Considerations
561(2)
Layer 3 Control Plane Security Considerations
563(1)
Remote-Access and Network Overlays (VPN) Security Considerations
564(2)
Network-Based Firewall Considerations
566(2)
Further Reading
568(1)
Network Management
569(7)
Fault, Configuration, Accounting, Performance, and Security
570(1)
Network Management High-Level Design Considerations
571(3)
Multitier Network Management Design
574(2)
Further Reading
576(1)
Summary
576(1)
Appendix References 577
Marwan Al-shawi , CCDE No. 20130066, is a lead design with British Telecom Global Services. He helps large-scale enterprise customers to select the right technology solutions for their business needs and provides technical consultancy for various types of network designs and architectures. Marwan has been in the networking industry for more than 12 years and has been involved in architecting, designing, and implementing various large-scale networks, some of which are global service provider-grade networks. Marwan has also worked as a technical consultant with Dimension Data Australia, a Cisco Global Alliance Partner; network architect with IBM Australia global technology services; and other Cisco partners and IT solution providers. He holds a Master of Science degree in internetworking from the University of Technology, Sydney. Marwan also holds other certifications such as Cloud Architect Expert (EMCCAe), Cisco Certified Design Professional (CCDP), Cisco Certified Network Professional Voice (CCNP Voice), and Microsoft Certified Systems Engineer (MCSE). Marwan was selected as a Cisco Designated VIP by the Cisco Support Community (CSC) (official Cisco Systems forums) in 2012, and by the Solutions and Architectures subcommunity in 2014. In addition, in 2015, Marwan was selected as a member of the Cisco Champions program.