homeaboutcontacttestimonialsregistercourse scheduleblog            
CCDA - Designing for Cisco Internetwork Solutions (DESGN)

 

CCDA Schedule

CCDA Cost

 

 

Who should attend CCDA?

 

Channel Partner / Reseller

Customer

Employee

 

CCDA Course Objectives

 

Upon completing this course, the learner will be able to meet these overall objectives:

 

Discuss methodology in network design.

 

Describe how to structure and modularize the network design using the Cisco Enterprise Architecture Design the Enterprise Campus and Enterprise Data Center modules.

 

Design the Remote Connectivity modules as needed.

 

Design a network addressing plan and select a suitable routing protocol for a given network design.

 

Evaluate security solutions for the network.

 

Discuss the design implications of voice transport across the network.

 

Discuss the design implications of wireless networking.



CCDA Course Syllabus PDF Available

 

Designing for Cisco Internetwork Solutions – Volume 1

 

Course Introduction
Overview
Learner Skills and Knowledge
Course Goal and Objectives
Course Flow
Additional References
Your Training Curriculum
Design Zone- Cisco Validated Designs
Cisco Live & Networkers Online
General Administration

 

Network Design Methodology Overview
Module Objectives

 

Understanding the Network Architectures for the Enterprise

Overview
Objectives
Business Drivers for a New Network Framework
Business Forces
Technology-Related Forces
IT Challenges
Cisco Network Architectures for the Enterprise
Borderless Networks Architecture
Borderless Networks Architecture Approach
Collaboration Architecture Approach
Data Center/ Virtualization Architecture Approach
Summary

 

Identifying Design Requirements
Overview
Objectives
Using the PPDIOO Approach for Networks
Benefits of the Life-Cycle Approach
Using the PPDIOO Design Methodology
Identifying Customer Design Requirements
Identifying Network Applications and Network Services
Example: Planned Applications
Example: Planned Intelligent Network Services
Defining Organizational Constraints
Example: Defining Organizational Goals
Defining Organizational Constraints
Example: Organizational Constraints
Defining Technical Goals
Example: Technical Goals
Assessing Technical Constraints
Example: Technical Constraints
Summary

 

Characterizing the Existing Network and Sites
Overview
Objectives
Characterizing the Network and Sites
Identifying Major Features of the Network
Sample Site Contact Information
Example: Network Diagram
Auditing the Existing Network
Example: Network Audit Information Sources
Example: Network Audit
Using Tools for Auditing the Network
RSPAN with VACLs for Granular Traffic Analysis
Example: Automatic Information Collection NetIQ Vivinet Assessor
Example: Automatic Information Collection Using NetMRI
Example: Cisco IOS NetFlow Printout
Example: NBAR Printout
Analyzing Network Traffic and Applications
Example: Traffic Analysis
Using Tools for Analyzing Network Traffic
Example: AirMagnet VoFi Graph
Example: SolarWinds Orion
Reviewing Network Traffic Information
Analyzing Network Health
Example: Equipment Summary Report
Example: Summary Report Problem Statement
Example: Summary Report Recommendations
Network Characterization Time Estimates
Summary

 

Using a Top-Down Approach to Network Design
Overview
Objectives
Introducing the Top-Down Approach to Network Design
Example: Top-Down Voice Design          
Using Decision Tables in Network Design
Example: Selecting a Routing Protocol
Assessing the Scope of the Network Design Project
Example: Assessing the Scope of the Network
Using Structured Design Principles
Logical Structure
Physical Structure
Planning an Implementation
Example: Planning an Implementation
Example: Summary Implementation Plan
Testing Your Design
Example: Pilot Network
Design Documentation
Summary
Module Summary
References
Module Self-Check
Module Self-Check Answer Key
    
Structuring and Modularizing the Network
Overview
Module Objectives

 

Designing the Network Hierarchy
Overview
Objectives
Introducing the Hierarchical Network Model
Describing Access Layer Functionality
Campus Access Layer Connectivity
Describing Distribution Layer Functionality
Example: Distribution Layer in the Traditional Campus Network
Example: Distribution Layer in the Routed Campus Network
Describing Core Layer Functionality
Example: Core Layer in the Traditional Campus Network
Example: Core Layer in the Routed Campus Network
Example: Collapsed Core in the Traditional Campus Network
Example: Collapsed Core in the Routed Campus Network
Summary

 

Using a Modular Approach in Network Design
Overview
Objectives
Describing Cisco Network Architectures for the Enterprise Modules
Guidelines
Example: Dividing the Network into Areas
Describing Enterprise Campus Infrastructure Modules
Campus Infrastructure Module
Describing the Enterprise Edge Modules
E-Commerce Module
Internet Connectivity Module
Remote Access and VPN Module
WAN and MAN and Site-to-Site VPN Module
Guidelines
Service Provider Modules
Describing Enterprise Remote Modules
Enterprise Branch Module
Enterprise Data Center Module
Enterprise Teleworker Module
Summary

 

Supporting Services on Borderless Networks
Overview
Objectives
Explaining the Role of Borderless Network Services
Security Infrastructure Services
Designing Security to Protect Against External Threats
Example: Voice Network Solution
Mobility Considerations
Application Performance Considerations
Example: Cisco ANS Can Resolve Application Issues
Example: Cisco ANS Components
High-Availability Network Services
Design Consideration: Full-Mesh vs. Partial-Mesh Redundancy
Example: Attachment Through a Redundant NIC
Summary

 

Identifying Network Management Protocols and Features
Overview
Objectives
Network Management Overview
SNMP Characteristics    
SNMP Message Types
SNMP Version 2
SNMP Version 3
Management Information Base (MIB) Characteristics
Example: Cisco Router MIB
Example: Variable Retrieval
Using RMON
NetFlow Characteristics
Example: NetFlow vs. RMON Information Gathering
Applications Using NetFLow
Cisco Discovery Protocol Features
Syslog Features
Example: Syslog Messages
Summary
Module Summary
References
Module Self-Check
Module Self-Check Answer Key

 

Designing Basic Campus and Data Center Networks
Overview
Module Objectives

 

Describing Campus Design Considerations
Overview
Objectives
Campus Design Factors
Network Application Characteristics and Considerations
Network Requirements of Applications
Environmental Characteristics and Considerations
Transmission Media Considerations
Copper
Optical Fiber
Wireless
Example: Campus Transmission Media
Example: Transmission Media
Infrastructure Device Characteristics and Considerations
Example Network Service: QoS in LAN Switches
QoS Mechanisms
Typical Switch Deployment in the Campus Infrastructure
Summary
References

 

Designing the Campus Infrastructure Module
Overview
Objectives
Design Considerations for the Campus Network
Design Considerations for the Building Access Layer
Best Practices in the Building Access Layer
Manage VLANs and STP
Manage Trunks Between Switches
Manage Default PAgP Settings
Consider Implementing Routing in the Access Layer
Design Considerations for the Building Distribution Layer
Best Practices in the Distribution Layer
Use First-Hop Redundancy Protocols
Deploying Layer 3 Routing Protocols
Supporting Layer 2 VLANs Spanning Multiple Access Layer Switches
Design Considerations for the Campus Core Layer
Small and Medium Campus Design Options
Small Campus Collapsed Core Network Design Option
Medium Campus Collapsed Core Network Design Option
Edge Distribution at the Campus Core
Alternative Designs for Edge Distribution Switches
Summary
References

 

Describing Enterprise Data Center Considerations
Overview
Objectives
Describing the Enterprise Data Center Architectures
Cisco Enterprise Data Center Architecture Framework
Example:  Data Center 3.0 Components Layout
Enterprise Data Center Infrastructure
Data Center Access Layer
Data Center Aggregation Layer
Data Center Core Layer
Summary
References

 

Describing Enterprise Network Virtualization Tools
Overview
Objectives
Virtualization Overview
Challenges
What is Virtualization?
Types of Virtualization
Virtualization Technologies
Network Virtualization Design Considerations
Summary
References
Module Summary
References
Module Self-Check
Module Self-Check Answer Key

 

Designing Remote Connectivity
Overview
Module Objectives

 

Identifying WAN Technology Considerations
Overview
Objectives
Review of WAN Features
Example: WAN Interconnections
Comparison of WAN Transport Technologies
Time-Division Multiplexing
ISDN Connectivity
Frame Relay
Multiprotocol Label Switching
Metro Ethernet
DSL Technology
Cable Technology
Wireless Technology
SONET and SDH Technology
DWDM Technology
Dark Fiber
WAN Transport Technology Pricing and Contract Considerations
WAN Design Requirements
Response Time
Throughput
Example: Response Time and Link Utilization
Reliability
QoS Considerations for Bandwidth Constraints
Traffic Shaping and Policing
Summary

 

Designing the Enterprise WAN
Overview
Objectives
Traditional WAN Designs
Remote-Access Network Design
VPN Design
Enterprise vs. Service Provider Managed VPN
Enterprise Managed VPN:  IPsec
IPsec Direct Encapsulation
Cisco Easy VPN
Layer 3 Tunneling
IPsec VTI Design
L2TPv3 Design
Service Provider Managed VPN: Metro Ethernet
VPLS Design
MPLS Design
MPLS Layer 3 VPN Design
WAN Backup Design
WAN Backup Design for the Internet
Selecting the Enterprise WAN Architecture
Cisco Enterprise MAN and WAN Architecture
Selecting Enterprise WAN Components
Hardware Selection
Hardware Selection: Cisco ISR G2
Software Selection
Summary

 

Designing the Enterprise Branch
Overview
Objectives
Enterprise Branch Architecture
Enterprise Branch Design
New Features on the ISR G2 Routers
Small Branch Office Design
Medium Branch Office Design
Large Branch Office Design
Enterprise Teleworker (Cisco Virtual Office Solution) Design
New ISRs for Small Offices and Teleworkers
Summary
Module Summary
References
Module Self-Check
Module Self-Check Answer Key

 

Designing for Cisco Internetwork Solutions – Volume 2

 

Designing IP Addressing and Selecting Routing Protocols
Overview
Objectives

 

Designing IPv4 Addressing
Overview
Objectives
IPv4 Addressing
Private and Public Addressing Guidelines
Developing an Addressing Plan
Planning the IP Addressing Hierarchy
Design Consideration: Route Summarization Groups
Example: Address Blocks by Location
Example: Hierarchical IP Addressing Plan
Recommended Practices for Name Resolution
Example: Locating DHCO and DNS Servers in the Network
IP Address Space Planning Roadmap
Summary

 

Designing IPv6 Addressing
Overview
Objectives
IPv6 Addressing
Example: IPv6 Address
Benefits for IPv6 Addressing
IPv6 Address Types
IPv6 Address Assignment Strategies
Identifying IPv6 Name Resolution          
Making the Transition from IPv4 to IPv6
Strategies for IPv6 Deployment
Dual-Stack Model
Hybrid Model
Service Block Model
Summary

 

Reviewing Enterprise Routing Protocols
Overview
Objectives
Reviewing Routing Protocol Fundamentals
Differentiating Between Distance Vector and Link-State Routing Protocols
Differentiating Between Interior and Exterior Routing Protocols
Example: Interior vs. Exterior Routing Protocols
Routing Protocol Convergence
Routing Protocols for the Enterprise
Enhanced IGRP
Open Shortest Path First
Border Gateway Protocol
IPv6 Routing
Selecting an Enterprise Routing Protocol
Summary

 

Designing a Routing Protocol Deployment
Overview
Objectives
Applying Routing Protocols to a Hierarchical Network Structure
Routing in the Campus Core
Routing in the Building Distribution Layer
Routing in the Enterprise Edge Area
Routing in the Remote-Access and VPN and Internet Connectivity Modules
Route Redistribution
Route Redistribution Planning
Route Filtering
Route Summarization
Recommended Practice: Summarize at the Distribution Layer
Recommended Practice: Passive Interfaces for IGP at the Access Layer
IPv6 Route Summarization
Summary
Module Summary
References
Module Self-Check
Module Self-Check Answer Key

 

Evaluating Security Solutions for the Network
Overview
Module Objectives

 

Defining Network Security
Overview
Objectives
Network Security Background
Examples: Security Legislation
Example Threat: Reconnaissance Attacks
Example Threat: Gaining Unauthorized Access to Systems
Example Risk: Integrity Violations and Confidentiality Breaches
Example Risk: Loss of Availability
Everything is a Potential Target
Understanding Network Security Policy and Processes
Definition of a Security Policy
Example: Risk Assessment and Management
Example: Security Policy
Network Security is a Continuous Process
Integrating Security Design and Network Design
Summary

 

Understanding the Cisco SAFE Approach
Overview
Objectives
Cisco SAFE Architecture
The Network as a Platform for Security
Cisco Security Control Framework
Trust and Identity Management
Trust
Identity
Access Control
Trust and Identity Management Technologies
Identity and Access Control Deployment Locations
Threat Defense
Incorporating Physical Security
Infrastructure Protection            
Threat Detection and Mitigation
Threat Detection and Mitigation Solutions
Example: Threat Detection and Mitigation Solution Deployment Locations
Example: Cisco IronPort ESA
Example: Cisco IronPort WSA
Secure Connectivity
Encryption Fundamentals
VPN Protocols
Ensuring Privacy
Maintaining Data Integrity
Security Management
Summary

 

Selecting Network Security Solutions
Overview
Objectives
Security Integration in Network Devices
Cisco IOS Security
Security Appliances
Intrusion Prevention System
Cisco Catalyst Services Modules
Endpoint Security Solutions
Securing the Enterprise Network
Example: Deploying Identity and Access Control in the Enterprise Campus
Example: Deploying Threat Detection and Mitigation in the Enterprise Campus
Example: Deploying Infrastructure Protection in the Enterprise Campus
Example: Deploying Security in the Enterprise Campus
Example: Deploying Identity and Access Control in the Enterprise Data Center
Example: Deploying Threat Detection and Mitigation in the Enterprise Data Center
Example: Deploying Infrastructure Protection in the Enterprise Data Center
Example: Deploying Security in the Data Center
Example: Deploying Identity and Access Control in the Enterprise Edge
Example: Deploying Threat Detection and Mitigation in the Enterprise Edge
Example: Deploying Infrastructure Protection in the Enterprise Edge
Example: Deploying Security in the Enterprise Edge
Summary            
Module Summary
References
Module Self-Check
Module Self-Check Answer Key

 

Identifying Voice and Video Networking Considerations
Overview
Module Objectives

 

Integrating Voice and Video Architectures
Overview
Objectives
Differentiating Between Analog and Digital Signaling
Introducing Voice and Video over IP
Voice and Standard Standards
Terminals
Gateways
Gatekeepers
Multipoint Control Units
Example: Importance of a Gatekeeper
Introducing H.264
Introducing VOIP
VOIP Design Models
Introducing Video Considerations
Media Application Models
Delivery of Media Application  
Architectural Framework for Media Services
Call Control and Transport Protocols
Call Control Functions with H.323
Voice Conversation with RTP
Call Control Functions with SSCP
Call Control Functions with SIP
Call Control Functions with MGCP
Summary

 

Identifying the Requirements of Voice and Video Technologies
Overview
Objectives
Minimizing Delay, Jitter, and Loss
One-Way Networking Delay Recommendations
Propagation Delay
Serialization Delay
Processing Delay
Queuing Delay
Dejitter Buffers
Preventing Echo
Example: How Echo Cancellers Work
Echo Cancellation Guidelines
Voice Coding and Compression
Codec Complexity, DSPs, and Voice Calls
Bandwidth Considerations
Reducing Voice Traffic with cRTP
Reducing Voice Traffic with VAD
Example: Voice Bandwidth and Codec Standards
Example: Bandwidth Calculation
Example: Voice Codec Bandwidth Calculator
Typical Video Resolution and Bandwidth
Bandwidth Requirements of H.264 Video Streams
Using QoS for Voice and Video
Example: Low Latency Queuing
QoS Considerations for Voice and Video in the WAN
Call Rerouting Alternatives
Example: Call Admission Control
Implementing CAC with RSVP
Voice Traffic Engineering Overview
Example: Erlang B Table
Summary
Module Summary
References
Module Self-Check
Module Self-Check Answer Key

 

Identifying Design Considerations for Basic Wireless Networking
Overview
Module Objectives


Cisco Unified Wireless Network Review
Overview
Objectives
Cisco Unified Wireless Network Architecture
Cisco Unified Wireless Network Elements
CAPWAP and LWAPP Fundamentals
Example: Layer 3 CAPWAP Architecture
Split Media Access Control
Local Media Access Control
Access Point Modes
Wireless Infrastructure
Wireless Authentication
Overview of WLAN Controllers
Example: WLANS, Interfaces, and Ports
Access Point Support and Scaling
Access Point Scalability Considerations
Example: Multiple AP Manager Interfaces
Example: LAG with a Single AP Manager Interface
Summary


Wireless Network Controller Technology
Overview
Objectives
Lightweight Access Point Connectivity to a WLC
WLC Selection
Lightweight Access Point Operations
Mobility in the Cisco Unified Wireless Network
Intracontroller Roaming
Intercontroller Roaming-Layer 2
Intercontroller Roaming-Layer 3
Mobility Groups
Example: Mobility Group Requirements
Recommended Practices for Supporting Roaming
Controller Redundancy Design
Deterministic Controller Redundancy
Example: Deterministic Controller Redundancy
Dynamic Controller Redundancy
Example: Dynamic Controller Redundancy
N + 1 Redundancy Design
N + N Redundancy Design
N + N + 1 Redundancy Design
Radio Resource Management and RF Groups
Access Point Self-Healing
Summary

 

Designing Wireless Networks Using Controllers
Overview
Objectives
RF Site Survey
RF Site Survey Process
Design Considerations for Campus Wireless Networks
Example: CAPWAP Access Point Feature Summary
Controller Placement Design
Example: Centralized WLC Placement
Example: Distributed WLC Design
Campus Cisco Wireless LAN Controller Options
Design Considerations for Branch Wireless Networks
Hybrid REAP
Branch Office Cisco Wireless LAN Controller Options
Design Considerations for Guest Services in Wireless Networks
Design Considerations for Outdoor Wireless Networks
Wireless Mesh Components
Example: MAP-to-RAP Connectivity
Mesh Design Recommendations
Summary
Module Summary
References
Module Self-Check
Module Self-Check Answer Key

 

Designing for Cisco Internetwork Solutions

 

Lab Guide                                                          

 

Overview
This guide presents the instructions and other information concerning the lab activities for this course. You can find the solutions in the Lab Activity Answer Key.

 

Outline

 

This guide includes these activities:

  • Case Study 1-1: ACMC Hospital Network Upgrade Information
  • Case Study 2-1: ACMC Hospital Network Structure and Modularity
  • Case Study 3-1: ACMC Hospital Network Campus Design
  • Case Study 4-1: ACMC Hospital Network WAN Design
  • Case Study 5-1: ACMC Hospital Network IP Addressing and Routing Protocol Design
  • Case study 6-1: ACMC Hospital Network Security Design
  • Case Study 7-1: ACMC Hospital Network Voice Transport Considerations
  • Case Study 8-1: ACMC Hospital Network Wireless Networking Considerations
  • Case Study 8-2: Connecting More Hospitals to the ACMC Hospital Network
  • Answer Key
  • Course Worksheets     

 




CC Bootcamp Twitter
CC Bootcamp Linkedin
Pearson Vue
CONTACT US | TOLL FREE: 1.877.654.2243 or 1.877.NLI.CCIE | INTERNATIONAL: +1.702.968.5100
©2010 Network Learning, Inc. All Rights Reserved.