
CCDA/CCDP Flash Cards and Exam Practice Pack
by Sequeira, Anthony; Wallace, KevinRent Book
New Book
We're Sorry
Sold Out
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Author Biography
Table of Contents
Foreword | p. xv |
Introduction | p. xvi |
CCDA-DESGN | p. 3 |
Network Design Methodologies | p. 4 |
Evaluating Organizational Policies and Procedures | p. 12 |
Examining Customer Requirements | p. 18 |
Characterizing the Existing Network | p. 30 |
Implementing the Design Methodology | p. 40 |
Network Hierarchies | p. 46 |
Modular Network Designs | p. 56 |
Switching Design Considerations | p. 66 |
Campus Design Details | p. 76 |
Enterprise WAN Solutions | p. 90 |
IP Addressing | p. 104 |
Routing Protocols | p. 120 |
Security | p. 142 |
Voice | p. 156 |
Network Management | p. 176 |
CCDA-DESGN Quick Reference Sheets | p. 190 |
Network Design Methodologies | p. 190 |
PDIOO | p. 190 |
Design Methodology | p. 190 |
ROI | p. 190 |
Top-Down Design Approach | p. 190 |
Bottom-Up Design Approach | p. 190 |
Decision Tables | p. 190 |
Evaluating Organizational Policies and Procedures | p. 191 |
Network Organization Models | p. 191 |
Network Organizational Architecture Components | p. 191 |
Organizational Policies | p. 191 |
Organizational Procedures | p. 191 |
Examining Customer Requirements | p. 191 |
Scope | p. 191 |
Design Data-Gathering Steps | p. 191 |
Characterizing the Existing Network | p. 191 |
Network Auditing | p. 192 |
Network Auditing Recommendations | p. 192 |
Manual Network Auditing Tools | p. 192 |
Automated Network Auditing Tools | p. 192 |
Network Traffic Analysis | p. 192 |
Summary Report | p. 192 |
Implementing the Design Methodology | p. 192 |
Pilot Versus Prototype | p. 192 |
Documenting the Design | p. 193 |
Network Hierarchies | p. 193 |
Modular Network Designs | p. 193 |
Enterprise Composite Network Model | p. 193 |
Switching Design Considerations | p. 195 |
Shared Versus Switched | p. 195 |
Network Application Comparison Criteria | p. 195 |
L2 and L3 Design Considerations | p. 195 |
Spanning Tree Protocol | p. 195 |
Campus Design Details | p. 196 |
80/20 Rule | p. 196 |
20/80 Rule | p. 196 |
Multicast | p. 196 |
QoS | p. 196 |
Access Layer Considerations | p. 196 |
Distribution Layer Considerations | p. 197 |
Core Layer Considerations | p. 197 |
Single L2 VLAN Core Design | p. 197 |
Split L2 Core Design | p. 197 |
L3 Core Design | p. 197 |
Dual-Path L3 Core Design | p. 197 |
Server Farm Module | p. 197 |
Edge Distribution Module | p. 197 |
Enterprise WAN Solutions | p. 197 |
Traditional WAN Technologies | p. 197 |
Emerging Technologies | p. 198 |
Application Drivers for WAN Selection | p. 198 |
Bandwidth Optimization Techniques | p. 198 |
Window Size | p. 198 |
Queuing Services | p. 198 |
WAN Backup Technologies | p. 198 |
MPLS | p. 199 |
IP Addressing | p. 199 |
Address Classes | p. 199 |
Conversion Table | p. 199 |
Defining Subnets | p. 199 |
Design Questions to Answer | p. 199 |
Private IPv4 Addresses | p. 199 |
Network Address Translation | p. 199 |
Route Summarization | p. 199 |
Fixed Length Subnet Masking | p. 199 |
Variable Length Subnet Masking | p. 199 |
Classful Versus Classless Routing Protocols | p. 199 |
Assigning Addresses | p. 200 |
Name Resolution | p. 200 |
IPv6 | p. 200 |
IPv6 Address Formats | p. 200 |
IPv6 Header | p. 200 |
IPv6 Address Types | p. 200 |
IPv6 Routing Protocols | p. 200 |
IPv6 Address Assignment | p. 200 |
IPv4 to IPv6 Deployment | p. 200 |
Routing Protocols | p. 201 |
Static Versus Dynamic | p. 201 |
Distance Vector Versus Link-State | p. 201 |
Interior Versus Exterior | p. 201 |
Hierarchical Versus Flat | p. 201 |
ODR Routing | p. 201 |
RIP v2 | p. 202 |
EIGRP | p. 202 |
OSPF | p. 202 |
Integrated IS-IS | p. 202 |
BGP | p. 202 |
Security | p. 202 |
Denial of Service Attacks | p. 202 |
Reconnaissance Attacks | p. 202 |
Traffic Attacks | p. 202 |
Network Security Practices | p. 202 |
Physical Security | p. 202 |
AAA | p. 202 |
SAFE Blueprint | p. 203 |
SAFE Guidelines for Securing the Internet Connectivity Module | p. 203 |
SAFE Guidelines for Securing the E-Commerce Module | p. 203 |
SAFE Guidelines for Securing the Remote Access and VPN Module | p. 203 |
SAFE Guidelines for Securing the WAN Module | p. 203 |
SAFE Guidelines for Securing the Network Management Module | p. 203 |
SAFE Guidelines for Securing the Server Farm Module | p. 203 |
Voice | p. 203 |
PBX | p. 203 |
PSTN Switch | p. 204 |
Telephone Infrastructure | p. 204 |
Telephony Signaling | p. 204 |
Analog Signaling | p. 204 |
Analog and Digital Trunk Signaling | p. 204 |
PSTN Numbering Plans | p. 205 |
PSTN Services | p. 205 |
VoIP | p. 205 |
H.323 | p. 205 |
Single-Site Design | p. 205 |
Centralized IP Telephony Design | p. 205 |
Internet IP Telephony Design | p. 206 |
Dial Plans | p. 206 |
Voice Issues | p. 206 |
Coding and Compression Algorithms | p. 206 |
Voice-Coding Standards | p. 206 |
Mean Opinion Score | p. 206 |
Call Control Functions | p. 206 |
VoFR | p. 206 |
VoATM | p. 206 |
QoS for Voice | p. 206 |
Congestion Management QoS Mechanisms | p. 206 |
On-Net and Off-Net Calling | p. 207 |
Grade of Service | p. 207 |
Erlang Tables | p. 207 |
DSP | p. 207 |
Calculating Capacity for the WAN | p. 207 |
Call Admission Control | p. 207 |
Campus IP Telephony Capacity Planning | p. 207 |
Network Management | p. 207 |
SNMP | p. 207 |
RMON | p. 208 |
CDP | p. 208 |
Syslog | p. 208 |
FCAPS | p. 208 |
Service Level Agreements | p. 208 |
Service Level Management | p. 208 |
CiscoWorks | p. 208 |
Service Assurance Agent | p. 209 |
Internetwork Performance Monitor | p. 209 |
CCDP-ARCH | p. 211 |
Network Architectures | p. 212 |
The Enterprise Edge | p. 244 |
Network Management | p. 266 |
High Availability | p. 278 |
Network Security | p. 292 |
Quality of Service | p. 308 |
IP Multicasting | p. 324 |
VPNs | p. 344 |
Wireless LANs | p. 366 |
IP Telephony | p. 386 |
Content Networking | p. 408 |
Storage Networking | p. 422 |
CCDP-ARCH Quick Reference Sheets | p. 436 |
Network Architectures | p. 436 |
AVVID | p. 436 |
Network Deployment Concerns | p. 436 |
Enterprise Composite Network Model | p. 436 |
Enterprise Campus Components | p. 436 |
Enterprise Edge Components | p. 437 |
Service Provider Edge Components | p. 438 |
Steps to Campus Design | p. 438 |
Campus Design: Step 1 | p. 438 |
Campus Design: Step 2 | p. 438 |
Campus Design: Step 3 | p. 439 |
Campus Design: Step 4 | p. 440 |
Campus Design: Step 5 | p. 440 |
Campus Design: Step 6 | p. 440 |
Campus Design: Step 7 | p. 441 |
Server Farm Design | p. 441 |
The Enterprise Edge | p. 441 |
Steps to Enterprise Edge Design | p. 441 |
Enterprise Edge Design: Step 1 | p. 441 |
Enterprise Edge Design: Step 2 | p. 441 |
Enterprise Edge Design: Step 3 | p. 442 |
Enterprise Edge Design: Step 4 | p. 442 |
Enterprise Edge Design: Step 5 | p. 442 |
Enterprise Edge Design: Step 6 | p. 442 |
Enterprise Edge Design: Step 7 | p. 443 |
Enterprise Edge Design: Step 8 | p. 443 |
Remote Access and VPN Module | p. 443 |
Internet Connectivity Module | p. 444 |
Network Management | p. 444 |
Network Management Goals | p. 444 |
Policies and Procedures | p. 445 |
Functions of the Network Management Module | p. 445 |
CiscoWorks | p. 445 |
Network Management Infrastructure | p. 446 |
Network Management Data Collection | p. 447 |
Sizing Recommendations | p. 447 |
High Availability | p. 447 |
High Availability Measurement | p. 447 |
High Availability Design | p. 447 |
Fault-Tolerant Campus Design | p. 447 |
Hardware Redundancy | p. 448 |
Layer 3 Redundancy | p. 448 |
Spanning Tree Protocol Redundancy | p. 448 |
Design Considerations for High Availability Networks | p. 449 |
High Availability Best Practices | p. 449 |
Server Farm High Availability Design | p. 449 |
Enterprise Edge High Availability Design | p. 449 |
Network Security | p. 449 |
Security Risks | p. 449 |
Security Policy | p. 449 |
Security Process | p. 450 |
Security Keys | p. 450 |
Security Attacks and Mitigations | p. 450 |
Firewall Considerations | p. 451 |
Intrusion Detection System Considerations | p. 451 |
AAA | p. 451 |
IPSec | p. 451 |
Securing Network Components | p. 452 |
SAFE | p. 452 |
Quality of Service | p. 452 |
QoS Design Requirements | p. 452 |
IntServ and DiffServ | p. 453 |
Classification and Marking | p. 453 |
Congestion Avoidance | p. 453 |
Congestion Management | p. 454 |
Traffic Conditioning | p. 454 |
Signaling | p. 454 |
Link Efficiency Mechanisms | p. 454 |
QoS Design | p. 455 |
IP Multicasting | p. 455 |
Importance of IP Multicast | p. 455 |
Multicast Forwarding | p. 456 |
Group Membership/Distribution Trees | p. 456 |
PIM | p. 457 |
Control Mechanisms | p. 457 |
IP Multicast Networks | p. 458 |
VPNs | p. 458 |
The Need for VPNs | p. 458 |
VPN Tunneling | p. 458 |
VPN Security | p. 458 |
Site-to-Site Designs | p. 459 |
Challenge of Fragmentation | p. 460 |
IPSec VPN Modes | p. 460 |
Remote Access Designs | p. 460 |
Remote Access Provisioning | p. 461 |
Remote Access NAT Considerations | p. 461 |
Split-Tunneling | p. 461 |
Wireless LANs | p. 461 |
Need for Wireless Networks | p. 461 |
802.11 Standards | p. 461 |
Cisco Wireless Products | p. 461 |
WLAN Design and Planning | p. 462 |
WLAN Redundancy | p. 463 |
Mobility, Multicast, and QoS WLAN Support | p. 463 |
Designing WLAN Security | p. 463 |
Small Office WLAN Design | p. 463 |
Enterprise WLAN Design | p. 463 |
WLAN Design for SOHO Environments | p. 463 |
WLAN Design for Enterprise Enviroments | p. 464 |
IP Telephony | p. 464 |
Components of an IP Telephony Network | p. 464 |
Cisco CallManager Platform | p. 464 |
CCM Scalability (for CCM Version 3.1) | p. 464 |
CCM Design Models | p. 464 |
Gateway Selection | p. 464 |
Transcoding, MTP, and Conferencing | p. 465 |
Add-On Applications | p. 465 |
CCM Clusters | p. 465 |
CCM Design Guidelines | p. 465 |
IP Telephony Infrastructure Design | p. 467 |
Management, Availability, Security, and QoS Considerations | p. 468 |
Content Networking | p. 468 |
Components of Content Networking | p. 468 |
Content Caching | p. 469 |
Content Switching | p. 469 |
Content Routing | p. 469 |
Content Distribution and Management | p. 469 |
Services | p. 469 |
Designing Content Networks | p. 469 |
Designing Content Networking Solutions | p. 470 |
Storage Networking | p. 470 |
Need for Storage Networking | p. 470 |
Network Storage Models | p. 471 |
Underlying Technology | p. 471 |
Storage Network Services | p. 471 |
Designing Storage Networks | p. 471 |
Table of Contents provided by Ingram. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.