CCDP Self-Study
Home > Computing and Information Technology > Computer networking and communications > CCDP Self-Study: Designing Cisco Network Architectures (ARCH)
CCDP Self-Study: Designing Cisco Network Architectures (ARCH)

CCDP Self-Study: Designing Cisco Network Architectures (ARCH)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

A new edition of this title is available, ISBN-10: 1587055740 ISBN-13: 9781587055744   Cisco authorized self-study book for CCDP® 642-871 architectures foundation learning   Prepare for the CCDP ARCH exam 642-871 with the Cisco authorized self-study guide. This book teaches you how to: Understand the composition and deployment of the Cisco AVVID framework in network design Understand the composition and role of the Enterprise Composite Network Model in enterprise network design Design enterprise campus networks and their edge network connectivity to the Internet Understand and implement network management solutions in the network Integrate new technologies designed to enhance network performance and availability in the enterprise, such as high availability, QoS, multicasting, and storage and content networking Design and implement appropriate security solutions for enterprise networks Deploy wireless technologies within the enterprise Implement and design IP telephony solutions for the enterprise network CCDP Self-Study: Designing Cisco Network Architectures (ARCH) is a Cisco® authorized self-paced learning tool. By presenting a structured format for the conceptual and intermediate design of AVVID network infrastructures, this book teaches you how to design solutions that scale from small to large enterprise networks and take advantage of the latest technologies. Whether you are preparing for the CCDP® certification or simply want to gain a better understanding of how to architect network solutions over intelligent network services to achieve effective performance, scalability, and availability, you will benefit from the foundation information presented in this book.   This comprehensive book provides detailed information and easy-to-grasp tutorials on a broad range of topics related to architecture and design, including security, fine-tuning routing protocols, switching structures, and IP multicasting. To keep pace with the Cisco technological developments and new product offerings, this study guide includes coverage of wireless networking, the SAFE Blueprint, content networking, storage networking, quality of service (QoS), IP telephony, network management, and high availability networks. Design examples and sample verification output demonstrate implementation techniques. Configuration exercises, which appear in every chapter, provide a practical review of key concepts to discuss critical issues surrounding network operation. Chapter-ending review questions illustrate and help solidify the concepts presented in this book.   CCDP Self-Study: Designing Cisco Network Architectures (ARCH) is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining.   This volume is in the Certification Self-Study Series offered by Cisco Press®. Books in this series provide officially developed training solutions to help networking professionals understand technology implementations and prepare for the Cisco Career Certifications examinations.  

Table of Contents:
Introduction. 1. Introducing Cisco Network Service Architectures.     Primary Concerns of Network Deployment       Performance       Scalability       Availability     Cisco AVVID Framework       Cisco AVVID Common Network Infrastructure       Cisco AVVID Intelligent Network Services       Cisco AVVID Network Solutions     Enterprise Composite Network Model       Enterprise Campus Functional Area       Campus Infrastructure Module       Network Management Module       Server Farm Module       Edge Distribution Module     Effects of the Enterprise Campus Functional Area on the Enterprise Network       Enterprise Edge Functional Area       E-Commerce Module       Internet Connectivity Module       Remote Access and VPN Module       WAN Module     Effects of the Enterprise Edge Functional Area on the Enterprise Network       Service Provider Edge Functional Area       Summary       References       Product Summary       Review Questions 2. Designing Enterprise Campus Networks.     Enterprise Network Design Methodology       Campus Design Within the Enterprise Composite Network Model       Typical Requirements for an Enterprise Campus Network       Enterprise Campus Design Methodology       Analyzing Network Traffic Patterns     Designing the Campus Infrastructure       Designing the Logical Campus Network       One VLAN Per Switch       Unique VLANs Per Switch       VLANs Spanning Multiple Access Switches     Designing the Physical Campus Network       Selecting Transmission Media and Data-Link Protocols       Selecting a Physical Network Segmentation Strategy       Selecting and Implementing Spanning Tree Protocol     Selecting Data Link or Multilayer Switching Solutions       Small Campus Network       Medium Campus Network       Multilayer Switched Campus Backbone     Selecting Cisco Hardware and Software     Identifying an IP Addressing Strategy     Selecting Routing Protocols       Static Versus Dynamic Routing       RIP and RIPv2       IGRP       EIGRP       OSPF       IS-IS     Selecting Areas for Networks     Enterprise Campus Design Examples       Small Enterprise Design Example       Medium Enterprise Design Example       Large Enterprise Design Example     Designing the Server Farm       Design Objectives for the Server Farm       Server Farm Infrastructure Architecture       Designing the Server Farm for Scalability       Considerations for Server Farm Security and Manageability     Summary     References     Product Summary     Standards and Specifications Summary     Review Questions     Case Study: OCSIC Bottling Company       Background       Business Goals of OCSIC       Headquarters Location, Network, and Applications       North American Plants and Their Applications       Networking Strategies and Goals       Proposed Headquarters Campus Network Solution       Proposed Headquarters Server Farm Solution       Proposed North American Plan Model 3. Designing Enterprise Edge Connectivity.     Reviewing the Enterprise Edge Network Design Methodology       Enterprise Edge Design       Typical Requirements for the Enterprise Edge       Enterprise Edge Design Methodology       Analyzing Network Traffic Patterns     Designing the Classic WAN Module       Enterprise Needs for the WAN       Selecting the WAN Topology       Branch Office WAN       Regional Office WAN       Enterprise WAN Backbone       Selecting a Service Provider       Selecting the Data-Link Layer       Selecting the Physical Layer       Selecting WAN Features       Selecting Cisco Edge Routing Solutions       Routing Protocol and IP Addressing Considerations       An Enterprise WAN Design Example     Designing the Remote Access Module       Enterprise Needs for Remote Access       Selecting the Remote Access Type and Termination       Selecting the Remote Access Physical Connectivity       Selecting the Remote Access Protocol       Selecting Cisco Access Routing Solutions       Sizing the Central Site Remote Access Connection       An Enterprise Remote Access Design Example     Designing the Internet Connectivity Module       Enterprise Requirements for the Internet       Using NAT at the Enterprise Edge       Designing ISP Connectivity Solutions       Internet Connectivity Design Example     Summary     References     Product Summary     Standards and Specifications Summary     Review Questions     Case Study: OCSIC Bottling Company       North American Plant Headquarters WAN       Remote Access and Internet Connectivity Requirements       International Manufacturing, Distribution, and Sales Plants       International Plant Networks and Applications       WAN Module Design       Remote Access Design       Internet Connectivity Module Design 4. Designing Network Management Services.     Developing an Enterprise Network Management Strategy       Functional Areas of Network Management       FCAPS       Network Management Policies and Procedures       Policies       Procedures       Network Management Methods       Reactive-Event Driven       Proactive-Polling and Event Driven       Network Management Strategy Process       Network Management Module Functions       Cisco Network Management Strategy     CiscoWorks       CiscoWorks Common Management Foundation       CiscoWorks LAN Management Solution       Best Practices for Managing the LAN Using LMS       CiscoWorks Routed WAN Management Solution       Best Practices for Managing the WAN Using RWAN     Designing the Network Management Architecture     Network Management Design Considerations       Network Management Infrastructure Considerations       Network Management Data Collection and Management Considerations       Network Management Station Sizing Considerations       System Management Resource Considerations     Network Management Deployment Recommendations       Single Server Deployment       Multiserver, Split Applications-Single Management Domain       Multiple Management Domains       Centralized WAN Management with LAN Management       Key Questions to Consider       Availability Manager Issues     Network Management Design Scenarios       Small Site Network Management Design Scenario       Medium Site Network Management Design Scenario       Large Site Network Management Design Scenario     Summary     References     Product Summary     Standards and Specification Summary     Review Questions     Case Study: OCSIC Bottling Company 5. Designing High-Availability Services.     High-Availability Features and Options       Network Requirements for High Availability       Cisco IOS High-Availability Architecture       Fault Tolerance and Hardware Redundancy       Using Fault-Tolerant Devices       Providing Redundancy in the Network Topology       Route Processor Redundancy       Network Interface Card Redundancy       Options for Layer 3 Redundancy       Redundancy and Spanning Tree Protocol       PortFast and UplinkFast     Designing High-Availability Enterprise Networks       Design Guidelines for High Availability       Redundancy Options       Software Features and Protocol Attributes       Carrier and Circuit Types       Power Availability       High-Availability Design Goals and Conclusions       Best Practices for High-Availability Network Design       Enterprise Campus Design Guidelines for High Availability       Enterprise Edge Design Guidelines for High Availability       High-Availability Design Example     Summary     Reference     Product Summary     Standards and Specifications Summary     Review Questions     Case Study: OCSIC Bottling Company       High-Availability Design for the Campus Infrastructure Module       High-Availability Strategy for the Server Farm Module       High-Availability Strategy for the WAN Module       High-Availability Strategy for the Remote Access Module       High-Availability Strategy for the Internet Connectivity Module       Revised Network Diagrams 6. Designing Security Services.     Evaluating Network Security Policies       Network Vulnerabilities       Defining a Security Policy       Network Security as a Process       Securing the Network       Monitoring Security       Testing Security       Improving Security       Risk Assessment and Management     Reviewing Cisco Security Solutions       Key Elements of Network Security       Network Security Attack Types and Their Solutions       Packet Sniffers       IP Spoofing       DoS Attacks       Password Attacks       Man-in-the-Middle Attacks       Application Layer Attacks       Network Reconnaissance       Trust Exploitation       Port Redirection Attacks       Unauthorized Access Attacks       Viruses and Trojan Horses       Firewall Design Options       Implementing a Perimeter LAN       Firewall Filtering Rules       Perimeter Security: PIX Firewall       Perimeter Security: IOS Firewall       Intrusion Detection System Design Options       IDS Operation       IDS Deployment       Authentication, Authorization, and Accounting       RADIUS       TACACS+       Kerberos       Public Key Infrastructure       IP Security       Internet Key Exchange       Authentication Header       Encapsulating Security Payload       Device Security Options       Routers       Switches       Hosts       Network-Wide       Applications     Implementing Network Security Using the Cisco SAFE Security Blueprints       Introduction to Cisco SAFE Architecture       SAFE Security Strategies for Small Networks       Small Network Internet Connectivity Module       Small Network Campus Infrastructure Module       SAFE Security Strategies for Medium Networks       Medium Network Internet Connectivity       Medium Network Campus Infrastructure Module       Medium Network WAN Module       SAFE Security Strategies for Large Networks       Campus Infrastructure Module       Secure Network Management Module       Secure Server Farm Module       Secure Edge Distribution Module       SAFE Security Strategies for the Enterprise Edge       E-Commerce Module       Internet Connectivity Module       Remote Access and VPN Module       WAN Module Features     Summary     References     Product Summary     Standards and Specification Summary     Review Questions     Case Study: OCSIC Bottling Company 7. Designing QoS.     Identifying QoS Mechanisms       Enterprise Network Requirements for QoS       Delay       Delay Variation       Packet Loss       QoS-Enabled Network       QoS Architectures       IntServ       DiffServ       QoS Service Levels       Classification and Marking       Congestion Avoidance       Congestion Management       Traffic Conditioning       CAR: Managing Access Bandwidth Policy and Performing Policing       Traffic Shaping: Controlling Outbound Traffic Flow       Signaling       Link-Efficiency Mechanisms       LFI       cRTP and dcRTP       Summary of Key Cisco IOS Software QoS Categories and Features     Designing QoS for Enterprise Networks       QoS Design Guidelines       QoS Design Guidelines for Data       QoS Design Guidelines for Voice       QoS Design Guidelines for Video Conferencing       Designing QoS for the Enterprise Network       Example: QoS Solution     Summary     Reference     Product Summary     Standards and Specifications Summary     Review Questions     Case Study: OCSIC Bottling Company       QoS Design for the Site-to-Site WAN       QoS Design for the Campus Infrastructure Module 8. Designing IP Multicast Services.     Examining IP Multicast Services       IP Multicast Basics       IP Multicast Data-Delivery Principles       Multicast Forwarding       IP Multicast Group Membership and Distribution Trees       Source Trees       Shared Trees       Comparison of Source Trees and Shared Trees       Protocol Independent Multicast       PIM Dense Mode       PIM Sparse Mode       Sparse Mode, Dense Mode, and Sparse-Dense Mode       IP Multicast Control Mechanisms       IGMP       CGMP and IGMP Snooping       Designing IP Multicast Solutions for Enterprise Networks       IP Multicast Design Considerations for an Enterprise Campus     Designing IP Multicast for a Small Campus       Designing IP Multicast for a Large Enterprise Campus       Designing IP Multicast Over a WAN     Summary     References     Product Summary     Standards and Specifications Summary     Review Questions     Case Study: OCSIC Bottling Company       IP Multicast Design for OCSIC's New Application 9. Designing Virtual Private Networks.     VPN Technologies       Enterprise VPN Requirements       VPN Tunneling       VPN Security       IPSec       User Authentication       Encryption       VPN Termination       VPN Concentrators       VPN Client Software       VPN Management       VPN Management Considerations       CiscoWorks VPN/Security Management Solution     Designing Site-to-Site VPNs       Site-to-Site VPN Requirements       Key Design Considerations for Site-to-Site VPNs       Hub-and-Spoke VPN Topologies       Simple Full-Mesh VPN Topology       Hierarchical VPN Topology       High-Availability and Resiliency Considerations       Using a Routing Protocol over the VPN       Minimizing Packet Fragmentation       Implementing IPSec       Site-to-Site VPN Examples       Example: Small Site-to-Site VPN       Small Site-to-Site VPN Solution       Example: Large Site-to-Site VPN       Large Site-to-Site VPN Solution     Designing Remote-Access VPNs       Remote-Access VPN Requirements       Remote-Access VPN Design Considerations       Broadband Access Design Considerations       Capacity Planning for Remote-Access VPNs       NAT Issues       One-to-One Translation       Many-to-One Translation       NAT Traversal       VPN Split-Tunnel Communication       Remote-Access VPN Examples       Example: Small Remote-Access VPN       Small Remote-Access VPN Solution       Example: Large Remote-Access VPN       Large Remote-Access VPN Solution     Summary     References     Product Summary     Standards and Specification Summary     Review Questions     Case Study: OCSIC Bottling Company       Site-to-Site VPN Solution       Remote-Access VPN Solution       Revised Network Diagrams 10. Designing Enterprise Wireless Networks.     Reviewing the Wireless LAN Solution       Emerging Wireless Enterprise Network Needs       Wireless Communication Architecture       Access Point Coverage       Cell Distribution       802.11 Standards       Cisco Wireless Solutions       Access Points and Client Adapters       Workgroup Bridges       Wireless Bridges       Antennas     Designing WLANs for Enhanced Enterprise Communications       Enterprise WLAN Design Considerations       WLAN Data Rates       Client Density and Throughput       WLAN Coverage       RF Environment       Channel Selection       Access-Point Placement and Number       Inline Power       VLANs       IP Addressing       Infrastructure Availability       Back-End System Availability       Access-Point Hot Standby Redundancy       Roaming       Multicast       QoS       WLAN Security Design Considerations       WLAN Security Extension-EAP       WLAN LAN Extension-IPSec       WLAN Static WEP       Security Extension Comparison       Cisco EAP       Attack Mitigation Using EAP Authentication       Attack Mitigation Using IPSec       Small Office WLAN Design Model       Enterprise WLAN Design Model       Example: Enterprise WLAN Site Design       Example: Enterprise WLAN Remote Office Design       Remote-Access and Telecommuter WLAN Design Models     Summary     References     Product Summary     Standards and Specification Summary     Review Questions     Case Study: OCSIC Bottling Company 11. Designing IP Telephony Solutions.     Reviewing the Cisco IP Telephony Solution       Introducing the Cisco IP Telephony Solution       Cisco CallManager       Gateways and Control Protocols       Transcoders and Conferencing       Hardware Support       Unicast Conference Bridge       Cisco IP Telephony Applications     Designing a Network for Cisco IP Telephony       Cisco CallManager Cluster Design Considerations       Cluster Deployment Guidelines       Cluster Design       Designing Single-Site IP Telephony Solutions       Example: Single-Site       Single-Site Solution       Designing Multisite with Centralized Call Processing IP Telephony Solutions       Designing Multisite with Distributed Call Processing IP Telephony Solutions       Example: Distributed Call Processing       Distributed Call Processing Solution       Clustering over the IP WAN       Local Failover       Remote Failover       Network Infrastructure Design Considerations       Layer 2 Voice Transport       VoIP over Leased Lines       Voice over Frame Relay       Voice over ATM       Network Bandwidth Provisioning       Provisioning for Voice Bearer Traffic       Provisioning for Call Control Traffic       Traffic Engineering       Dial Plan Design Considerations       Intelligent Network Services for IP Telephony and Voice       IP Telephony Network Management Tools       High Availability       Voice Security       QoS Design Considerations     Summary     References     Product Summary     Standards and Specification Summary     Review Questions     Case Study: OCSIC Bottling Company 12. Designing Content Networking Solutions.     Reviewing the Content Networking Solution       Enterprise Content Networking Requirements       Content Networking Architecture       Content Caching       Transparent Caching Deployment       Proxy Caching Deployment       Reverse Proxy Caching Deployment       Content Switching       Content Routing       Direct Mode Content Routing       WCCP Mode Content Routing       Content Distribution and Management       Intelligent Network Services Integration     Designing Content Networking Solutions       Content Networking Design Considerations       Content Networking Solutions for Web Content Delivery       Example: Web Content Delivery       Web Content Delivery Solution       Content Networking Solutions for E-Commerce       Example: E-Commerce       E-Commerce Solution       Content Networking Solutions for Streaming Media       Example: Streaming Media       Streaming Media Solution     Summary     References     Product Summary     Standards and Specification Summary     Review Questions     Case Study: OCSIC Bottling Company 13. Designing Storage Networking Solutions.     Reviewing the Cisco Storage Networking Solution       Enterprise Needs for Storage Networking       Storage Consolidation       Business Continuance and Backup       Cisco Storage Networking Architecture       Network Storage Models       SANs       Network-Attached Storage       Network Technology Enablers for Storage Networks       iSCSI       FCIP       Intelligent Network Services for Storage Networking     Designing a Storage Networking Architecture with IP Access       Designing a Storage Networking Architecture       IP Access to Storage       Example: IP Access to Storage       IP Access to Storage Solution       Storage over WAN       Example: Storage over WAN       Storage over WAN Solution       Example: Storage over Optical Metro       Storage over Optical Metro Solution       Network-Attached Storage Model       Example: Network-Attached Storage       Network-Attached Storage Solution     Summary     References     Product Summary     Standards and Specification Summary     Review Questions     Case Study: OCSIC Bottling Company Appendix A. Answers to Review Questions.     Chapter 1     Chapter 2     Chapter 3     Chapter 4     Chapter 5     Chapter 6     Chapter 7     Chapter 8     Chapter 9     Chapter 10     Chapter 11     Chapter 12     Chapter 13 Glossary. Index.

About the Author :
Keith Hutton is a senior Cisco network administrator with Magma Communications Ltd., Canada’s leading, full-service Internet company. Prior to joining Magma, Keith worked as a certified Cisco Systems instructor with Global Knowledge Canada. He currently holds the CCNP® and CCDP certifications.   Amir Ranjbar, CCIE® No. 8669, is a senior network architect at Global Knowledge and is a certified Cisco Systems instructor. Amir is author of the CCNP CIT Exam Certification Guide, published by Cisco Press.    


Best Sellers


Product Details
  • ISBN-13: 9781587051852
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Language: English
  • Spine Width: 45 mm
  • Weight: 1336 gr
  • ISBN-10: 1587051850
  • Publisher Date: 16 Dec 2004
  • Binding: Hardback
  • No of Pages: 696
  • Sub Title: Designing Cisco Network Architectures (ARCH)
  • Width: 240 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
CCDP Self-Study: Designing Cisco Network Architectures (ARCH)
Pearson Education (US) -
CCDP Self-Study: Designing Cisco Network Architectures (ARCH)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

CCDP Self-Study: Designing Cisco Network Architectures (ARCH)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!