CCDP Self-Study : Designing Cisco Network Architectures (ARCH)

Amir Ranjbar, Keith Hutton

  • 出版商: Cisco Press
  • 出版日期: 2004-12-16
  • 定價: $2,250
  • 售價: 1.8$399
  • 語言: 英文
  • 頁數: 696
  • 裝訂: Hardcover
  • ISBN: 1587051850
  • ISBN-13: 9781587051852
  • 相關分類: Cisco

立即出貨(限量) (庫存=1)

買這商品的人也買了...

相關主題

商品描述

Description:

Cisco authorized self-study book for CCDP® 642-871 architectures foundation learning

 

Prepare for the CCDP ARCH exam 642-871 with the Cisco authorized self-study guide. This book teaches you how to:

  • Understand the composition and deployment of the Cisco AVVID framework in network design
  • Understand the composition and role of the Enterprise Composite Network Model in enterprise network design
  • Design enterprise campus networks and their edge network connectivity to the Internet
  • Understand and implement network management solutions in the network
  • Integrate new technologies designed to enhance network performance and availability in the enterprise, such as high availability, QoS, multicasting, and storage and content networking
  • Design and implement appropriate security solutions for enterprise networks
  • Deploy wireless technologies within the enterprise
  • Implement and design IP telephony solutions for the enterprise network

CCDP Self-Study: Designing Cisco Network Architectures (ARCH) is a Cisco® authorized self-paced learning tool. By presenting a structured format for the conceptual and intermediate design of AVVID network infrastructures, this book teaches you how to design solutions that scale from small to large enterprise networks and take advantage of the latest technologies. Whether you are preparing for the CCDP® certification or simply want to gain a better understanding of how to architect network solutions over intelligent network services to achieve effective performance, scalability, and availability, you will benefit from the foundation information presented in this book.

 

This comprehensive book provides detailed information and easy-to-grasp tutorials on a broad range of topics related to architecture and design, including security, fine-tuning routing protocols, switching structures, and IP multicasting. To keep pace with the Cisco technological developments and new product offerings, this study guide includes coverage of wireless networking, the SAFE Blueprint, content networking, storage networking, quality of service (QoS), IP telephony, network management, and high availability networks. Design examples and sample verification output demonstrate implementation techniques. Configuration exercises, which appear in every chapter, provide a practical review of key concepts to discuss critical issues surrounding network operation. Chapter-ending review questions illustrate and help solidify the concepts presented in this book.

 

CCDP Self-Study: Designing Cisco Network Architectures (ARCH) is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining.

 

This volume is in the Certification Self-Study Series offered by Cisco Press®. Books in this series provide officially developed training solutions to help networking professionals understand technology implementations and prepare for the Cisco Career Certifications examinations.

 

 

 

Table of Contents:

Introduction.

1. Introducing Cisco Network Service Architectures.

    Primary Concerns of Network Deployment

      Performance

      Scalability

      Availability

    Cisco AVVID Framework

      Cisco AVVID Common Network Infrastructure

      Cisco AVVID Intelligent Network Services

      Cisco AVVID Network Solutions

    Enterprise Composite Network Model

      Enterprise Campus Functional Area

      Campus Infrastructure Module

      Network Management Module

      Server Farm Module

      Edge Distribution Module

    Effects of the Enterprise Campus Functional Area on the Enterprise Network

      Enterprise Edge Functional Area

      E-Commerce Module

      Internet Connectivity Module

      Remote Access and VPN Module

      WAN Module

    Effects of the Enterprise Edge Functional Area on the Enterprise Network

      Service Provider Edge Functional Area

      Summary

      References

      Product Summary

      Review Questions

2. Designing Enterprise Campus Networks.

    Enterprise Network Design Methodology

      Campus Design Within the Enterprise Composite Network Model

      Typical Requirements for an Enterprise Campus Network

      Enterprise Campus Design Methodology

      Analyzing Network Traffic Patterns

    Designing the Campus Infrastructure

      Designing the Logical Campus Network

      One VLAN Per Switch

      Unique VLANs Per Switch

      VLANs Spanning Multiple Access Switches

    Designing the Physical Campus Network

      Selecting Transmission Media and Data-Link Protocols

      Selecting a Physical Network Segmentation Strategy

      Selecting and Implementing Spanning Tree Protocol

    Selecting Data Link or Multilayer Switching Solutions

      Small Campus Network

      Medium Campus Network

      Multilayer Switched Campus Backbone

    Selecting Cisco Hardware and Software

    Identifying an IP Addressing Strategy

    Selecting Routing Protocols

      Static Versus Dynamic Routing

      RIP and RIPv2

      IGRP

      EIGRP

      OSPF

      IS-IS

    Selecting Areas for Networks

    Enterprise Campus Design Examples

      Small Enterprise Design Example

      Medium Enterprise Design Example

      Large Enterprise Design Example

    Designing the Server Farm

      Design Objectives for the Server Farm

      Server Farm Infrastructure Architecture

      Designing the Server Farm for Scalability

      Considerations for Server Farm Security and Manageability

    Summary

    References

    Product Summary

    Standards and Specifications Summary

    Review Questions

    Case Study: OCSIC Bottling Company

      Background

      Business Goals of OCSIC

      Headquarters Location, Network, and Applications

      North American Plants and Their Applications

      Networking Strategies and Goals

      Proposed Headquarters Campus Network Solution

      Proposed Headquarters Server Farm Solution

      Proposed North American Plan Model

3. Designing Enterprise Edge Connectivity.

    Reviewing the Enterprise Edge Network Design Methodology

      Enterprise Edge Design

      Typical Requirements for the Enterprise Edge

      Enterprise Edge Design Methodology

      Analyzing Network Traffic Patterns

    Designing the Classic WAN Module

      Enterprise Needs for the WAN

      Selecting the WAN Topology

      Branch Office WAN

      Regional Office WAN

      Enterprise WAN Backbone

      Selecting a Service Provider

      Selecting the Data-Link Layer

      Selecting the Physical Layer

      Selecting WAN Features

      Selecting Cisco Edge Routing Solutions

      Routing Protocol and IP Addressing Considerations

      An Enterprise WAN Design Example

    Designing the Remote Access Module

      Enterprise Needs for Remote Access

      Selecting the Remote Access Type and Termination

      Selecting the Remote Access Physical Connectivity

      Selecting the Remote Access Protocol

      Selecting Cisco Access Routing Solutions

      Sizing the Central Site Remote Access Connection

      An Enterprise Remote Access Design Example

    Designing the Internet Connectivity Module

      Enterprise Requirements for the Internet

      Using NAT at the Enterprise Edge

      Designing ISP Connectivity Solutions

      Internet Connectivity Design Example

    Summary

    References

    Product Summary

    Standards and Specifications Summary

    Review Questions

    Case Study: OCSIC Bottling Company

      North American Plant Headquarters WAN

      Remote Access and Internet Connectivity Requirements

      International Manufacturing, Distribution, and Sales Plants

      International Plant Networks and Applications

      WAN Module Design

      Remote Access Design

      Internet Connectivity Module Design

4. Designing Network Management Services.

    Developing an Enterprise Network Management Strategy

      Functional Areas of Network Management

      FCAPS

      Network Management Policies and Procedures

      Policies

      Procedures

      Network Management Methods

      Reactive-Event Driven

      Proactive-Polling and Event Driven

      Network Management Strategy Process

      Network Management Module Functions

      Cisco Network Management Strategy

    CiscoWorks

      CiscoWorks Common Management Foundation

      CiscoWorks LAN Management Solution

      Best Practices for Managing the LAN Using LMS

      CiscoWorks Routed WAN Management Solution

      Best Practices for Managing the WAN Using RWAN

    Designing the Network Management Architecture

    Network Management Design Considerations

      Network Management Infrastructure Considerations

      Network Management Data Collection and Management Considerations

      Network Management Station Sizing Considerations

      System Management Resource Considerations

    Network Management Deployment Recommendations

      Single Server Deployment

      Multiserver, Split Applications-Single Management Domain

      Multiple Management Domains

      Centralized WAN Management with LAN Management

      Key Questions to Consider

      Availability Manager Issues

    Network Management Design Scenarios

      Small Site Network Management Design Scenario

      Medium Site Network Management Design Scenario

      Large Site Network Management Design Scenario

    Summary

    References

    Product Summary

    Standards and Specification Summary

    Review Questions

    Case Study: OCSIC Bottling Company

5. Designing High-Availability Services.

    High-Availability Features and Options

      Network Requirements for High Availability

      Cisco IOS High-Availability Architecture

      Fault Tolerance and Hardware Redundancy

      Using Fault-Tolerant Devices

      Providing Redundancy in the Network Topology

      Route Processor Redundancy

      Network Interface Card Redundancy

      Options for Layer 3 Redundancy

      Redundancy and Spanning Tree Protocol

      PortFast and UplinkFast

    Designing High-Availability Enterprise Networks

      Design Guidelines for High Availability

      Redundancy Options

      Software Features and Protocol Attributes

      Carrier and Circuit Types

      Power Availability

      High-Availability Design Goals and Conclusions

      Best Practices for High-Availability Network Design

      Enterprise Campus Design Guidelines for High Availability

      Enterprise Edge Design Guidelines for High Availability

      High-Availability Design Example

    Summary

    Reference

    Product Summary

    Standards and Specifications Summary

    Review Questions

    Case Study: OCSIC Bottling Company

      High-Availability Design for the Campus Infrastructure Module

      High-Availability Strategy for the Server Farm Module

      High-Availability Strategy for the WAN Module

      High-Availability Strategy for the Remote Access Module

      High-Availability Strategy for the Internet Connectivity Module

      Revised Network Diagrams

6. Designing Security Services.

    Evaluating Network Security Policies

      Network Vulnerabilities

      Defining a Security Policy

      Network Security as a Process

      Securing the Network

      Monitoring Security

      Testing Security

      Improving Security

      Risk Assessment and Management

    Reviewing Cisco Security Solutions

      Key Elements of Network Security

      Network Security Attack Types and Their Solutions

      Packet Sniffers

      IP Spoofing

      DoS Attacks

      Password Attacks

      Man-in-the-Middle Attacks

      Application Layer Attacks

      Network Reconnaissance

      Trust Exploitation

      Port Redirection Attacks

      Unauthorized Access Attacks

      Viruses and Trojan Horses

      Firewall Design Options

      Implementing a Perimeter LAN

      Firewall Filtering Rules

      Perimeter Security: PIX Firewall

      Perimeter Security: IOS Firewall

      Intrusion Detection System Design Options

      IDS Operation

      IDS Deployment

      Authentication, Authorization, and Accounting

      RADIUS

      TACACS+

      Kerberos

      Public Key Infrastructure

      IP Security

      Internet Key Exchange

      Authentication Header

      Encapsulating Security Payload

      Device Security Options

      Routers

      Switches

      Hosts

      Network-Wide

      Applications

    Implementing Network Security Using the Cisco SAFE Security Blueprints

      Introduction to Cisco SAFE Architecture

      SAFE Security Strategies for Small Networks

      Small Network Internet Connectivity Module

      Small Network Campus Infrastructure Module

      SAFE Security Strategies for Medium Networks

      Medium Network Internet Connectivity

      Medium Network Campus Infrastructure Module

      Medium Network WAN Module

      SAFE Security Strategies for Large Networks

      Campus Infrastructure Module

      Secure Network Management Module

      Secure Server Farm Module

      Secure Edge Distribution Module

      SAFE Security Strategies for the Enterprise Edge

      E-Commerce Module

      Internet Connectivity Module

      Remote Access and VPN Module

      WAN Module Features

    Summary

    References

    Product Summary

    Standards and Specification Summary

    Review Questions

    Case Study: OCSIC Bottling Company

7. Designing QoS.

    Identifying QoS Mechanisms

      Enterprise Network Requirements for QoS

      Delay

      Delay Variation

      Packet Loss

      QoS-Enabled Network

      QoS Architectures

      IntServ

      DiffServ

      QoS Service Levels

      Classification and Marking

      Congestion Avoidance

      Congestion Management

      Traffic Conditioning

      CAR: Managing Access Bandwidth Policy and Performing Policing

      Traffic Shaping: Controlling Outbound Traffic Flow

      Signaling

      Link-Efficiency Mechanisms

      LFI

      cRTP and dcRTP

      Summary of Key Cisco IOS Software QoS Categories and Features

    Designing QoS for Enterprise Networks

      QoS Design Guidelines

      QoS Design Guidelines for Data

      QoS Design Guidelines for Voice

      QoS Design Guidelines for Video Conferencing

      Designing QoS for the Enterprise Network

      Example: QoS Solution

    Summary

    Reference

    Product Summary

    Standards and Specifications Summary

    Review Questions

    Case Study: OCSIC Bottling Company

      QoS Design for the Site-to-Site WAN

      QoS Design for the Campus Infrastructure Module

8. Designing IP Multicast Services.

    Examining IP Multicast Services

      IP Multicast Basics

      IP Multicast Data-Delivery Principles

      Multicast Forwarding

      IP Multicast Group Membership and Distribution Trees

      Source Trees

      Shared Trees

      Comparison of Source Trees and Shared Trees

      Protocol Independent Multicast

      PIM Dense Mode

      PIM Sparse Mode

      Sparse Mode, Dense Mode, and Sparse-Dense Mode

      IP Multicast Control Mechanisms

      IGMP

      CGMP and IGMP Snooping

      Designing IP Multicast Solutions for Enterprise Networks

      IP Multicast Design Considerations for an Enterprise Campus

    Designing IP Multicast for a Small Campus

      Designing IP Multicast for a Large Enterprise Campus

      Designing IP Multicast Over a WAN

    Summary

    References

    Product Summary

    Standards and Specifications Summary

    Review Questions

    Case Study: OCSIC Bottling Company

      IP Multicast Design for OCSIC's New Application

9. Designing Virtual Private Networks.

    VPN Technologies

      Enterprise VPN Requirements

      VPN Tunneling

      VPN Security

      IPSec

      User Authentication

      Encryption

      VPN Termination

      VPN Concentrators

&