This document provides an overview of Himawan Nugroho's experience and qualifications as a CCDE, and outlines his suggested approach for preparing for the CCDE certification exam. Some key points include:
- Nugroho has over 7 years of experience as a network engineer and holds 3 CCIE and 1 CCDE certifications.
- He provides his personal recommendations for studying for the CCDE exam based on his experience, but notes Cisco does not endorse his suggestions and passing does not guarantee certification.
- The presentation covers an overview of the CCDE certification, Nugroho's experience obtaining it, and a proposed methodology ("CISCO") for designing a network to meet customer requirements to help prepare for
Class lecture by Prof. Raj Jain on Carrier Ethernet. The talk covers Options to Connect Two Data Centers?, Plesiochronous Digital Hierarchy (PDH), SONET/SDH, Multiprotocol Label Switching (MPLS), Label Switching Example, IP over MPLS over Ethernet, Martini Draft, Pseudo Wire: L2 Circuits over IP, Ethernet over PWE3 over MPLS, Virtual Private LAN Service (VPLS), Differentiated Services, Carriers vs. Enterprise, Issue: UNI vs Peer-to-Peer Signaling, UNI vs. ENNI, Operator Virtual Connection (OVC), Metro Access Ethernet Private Line, End-to-End Metro Ethernet Connection, Ethernet Virtual Connections (EVCs), Metro Ethernet Service Attributes, Metro Ethernet OAM, Metro Ethernet OAM Messages, Metro Ethernet Use Cases, Ethernet Provider Bridge (PB), Provider Backbone Network (PBB), MAC-in-MAC Frame Format, PBB Service Instance, Connection Oriented Ethernet, VLAN Cross-Connect, PBB-TE, PBB-TE QoS, Ethernet Tagged Frame Format Evolution, Comparison of Technologies. Video recording available in YouTube.
Class lecture by Prof. Raj Jain on Carrier Ethernet. The talk covers Options to Connect Two Data Centers?, Plesiochronous Digital Hierarchy (PDH), SONET/SDH, Multiprotocol Label Switching (MPLS), Label Switching Example, IP over MPLS over Ethernet, Martini Draft, Pseudo Wire: L2 Circuits over IP, Ethernet over PWE3 over MPLS, Virtual Private LAN Service (VPLS), Differentiated Services, Carriers vs. Enterprise, Issue: UNI vs Peer-to-Peer Signaling, UNI vs. ENNI, Operator Virtual Connection (OVC), Metro Access Ethernet Private Line, End-to-End Metro Ethernet Connection, Ethernet Virtual Connections (EVCs), Metro Ethernet Service Attributes, Metro Ethernet OAM, Metro Ethernet OAM Messages, Metro Ethernet Use Cases, Ethernet Provider Bridge (PB), Provider Backbone Network (PBB), MAC-in-MAC Frame Format, PBB Service Instance, Connection Oriented Ethernet, VLAN Cross-Connect, PBB-TE, PBB-TE QoS, Ethernet Tagged Frame Format Evolution, Comparison of Technologies. Video recording available in YouTube.
Neighboring Wi-Fi networks, RF noise sources, and indoor and outdoor coverage patterns can all impact mobile device performance on WLANs. This session will give you a better understanding of radio coverage patterns for different types of antennas and covers related essentials in the Wi-Fi standard. Join us also to learn more about 802.11ac, multi-user MIMO and transmit beamforming with Wave 2, and more.
What is NFV? How does it relate to SDN, what does it mean for the telecommunications industry, and why should anyone outside of that industry care?
Presentation delivered at CloudOpen Europe, Düsseldorf, October 2014
Are you thinking about the next step in your professional development? Whether you are an Engineer, Architect, or IT professional, it is vital to keep abreast with changes in your industry and position yourself so you can follow chosen path.
CCDE (Cisco Certified Design Expert) is the pinnacle of network design, Whether you are preparing for the CCDE exam or you are a Network Designer/Architect considering your options this slide is for you
Mohamed Radwan, a Solutions Architect with over 16 years’ experience, and holding CCDE#2014::67 prepared this presenation covering the following:
· preparation for written and practical exams
· resources
· recommended reading list
· experience/roadmap to accomplish this certificate
· sample questions and scenarios for the exam
Neighboring Wi-Fi networks, RF noise sources, and indoor and outdoor coverage patterns can all impact mobile device performance on WLANs. This session will give you a better understanding of radio coverage patterns for different types of antennas and covers related essentials in the Wi-Fi standard. Join us also to learn more about 802.11ac, multi-user MIMO and transmit beamforming with Wave 2, and more.
What is NFV? How does it relate to SDN, what does it mean for the telecommunications industry, and why should anyone outside of that industry care?
Presentation delivered at CloudOpen Europe, Düsseldorf, October 2014
Are you thinking about the next step in your professional development? Whether you are an Engineer, Architect, or IT professional, it is vital to keep abreast with changes in your industry and position yourself so you can follow chosen path.
CCDE (Cisco Certified Design Expert) is the pinnacle of network design, Whether you are preparing for the CCDE exam or you are a Network Designer/Architect considering your options this slide is for you
Mohamed Radwan, a Solutions Architect with over 16 years’ experience, and holding CCDE#2014::67 prepared this presenation covering the following:
· preparation for written and practical exams
· resources
· recommended reading list
· experience/roadmap to accomplish this certificate
· sample questions and scenarios for the exam
How I managed to achieve all 6 out of 6 targets of personal development during summer 2015. I was asked to provide holiday pictures in the presentation, hence I provided so many of them!
One Presentation that explains the exam, its history, its format & suggested learning resources for anyone who is planning to sit for the CCDE Practical Exam.
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends:
Exposing the device to a management framework
Exposing that management framework to a business centric logic
Exposing that business layer and data to end users.
This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles between cloud, APIs and native hardware/software configurations.
Network Design Webinar: The Journey of Becoming A Phenomenal Network ArchitectMohamed Radwan
This video explains the process of transitioning from network operations or implementation to network design.
It clears out and simplify that process from core concepts to acquiring the highest certificates of network design such as the prestigious CCDE.
Mohamed Radwan guides you through the journey of becoming a superb network designer, touching on essential topics such as the designer mindset and the skills you need, the core pillars of network design among many others…
Network and IT Ops Series: Build Production Solutions Neo4j
Jeff Morris, Director, Neo4j:Are you building a breakthrough product or extending an existing one? Do you need introduce new capabilities based on insights from data relationships? If so, you should consider embedding a graph database.
For software providers building products to assure quality network operations or security, using an embedded graph database may open new customer opportunities. Watch this webinar to learn how you can easily differentiate your applications and take your solutions to market faster with a native graph database like Neo4j.
For the full video of this presentation, please visit:
https://www.edge-ai-vision.com/2020/08/once-for-all-dnns-simplifying-design-of-efficient-models-for-diverse-hardware-a-presentation-from-mit/
For more information about edge AI and vision, please visit:
http://www.edge-ai-vision.com
Christine Cheng, co-chair of the inference benchmark working group at MLPerf and a senior machine learning optimization engineer at Intel, delivers the presentation “MLPerf: An Industry Standard Performance Benchmark Suite for Machine Learning” at the Edge AI and Vision Alliance’s July 2020 Edge AI and Vision Innovation Forum. Cheng explains how MLPerf’s inference benchmark suite for evaluating processor performance works and is evolving.
A proof of concept is an excellent way to showcase how a technology will provide immediate business value for your customer. To conduct a successful proof of concept using ThousandEyes, it's important to qualify the opportunity and outline what success looks like to that customer.
In this webinar, we will walk you through:
- What you need to know to run successful ThousandEyes proof of concepts focusing on the Enterprise Digital Experience use case
- A demo of how to capture interesting events within the platform during a proof of concept
Network Automation Journey, A systems engineer NetOps perspectiveWalid Shaari
Network devices play a crucial role; they are not just in the Data Center. It's the Wifi, VOIP, WAN and recently underlays and overlays. Network teams are essential for operations. It's about time we highlight to the configuration management community the importance of Network teams and include them in our discussions. This talk describes the personal experience of systems engineer on how to kickstart a network team into automation. Most importantly, how and where to start, challenges faced, and progress made. The network team in question uses multi-vendor network devices in a large traditional enterprise.
NetDevOps, we do not hear that term as frequent as we should. Every time we hear about automation, or configuration management, it is usually the application, if not, it is the systems that host the applications. How about the network systems and devices that interconnect and protects our services? This talk aims to describe the journey a systems engineer had as part of an automation assignment with the network management team. Building from lessons learned and challenges faced with system automation, how one can kickstart an automation project and gain small wins quickly. Where and how to start the journey? What to avoid? What to prioritise? How to overcome the lack of network skills for the automation engineer and lack of automation and Linux/Unix skills for network engineers. What challenges were faced and how to overcome them? What fights to give up? Where do I see network automation and configuration management as a systems engineer? What are the status quo and future expectations?
VMworld 2013: Balancing Agility with Service Standardization: Easy to Say But...VMworld
VMworld 2013
Moderator: Kurt Milne, VMware
Ian Clayton, G2G3 Americas
Dave Bartoletti, Forrester Research, Inc.
Chris Ward, LogicsOne
Khalid Hakim, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
A very unique and first of its kind workshop for Software developers, Testers, Business Analyst, Product/Project managers, Administrators, Architects, and other engineering team members on how to create the internal engineering documents such as:
- Design Documents, Requirement Specifications, User Stories, Epic
- API Guides, Functional Specifications, Porting Guide, Cook Book
- Architecture Docs, ERDs
Duration: 4 hours to 3-Days
Contact: Rajeev-rajeevjain72@gmail.com
Netlabs ITS offer 6 month diploma in hardware & networkingNetlabs ITS
NETLABS’s Hardware & Networking
Diploma Programme for Graduates in Final Year
Duration: 6 Months
Eligibility: Students should have appeared for/ passed, or currently be in final year of college in
any stream.
Learn Mechanical Digital Modeling With Auto CAD, CATIA v5, Solid-works & Pro-...techageacademy
Summer Training Institute Noida, Delhi NCR,Choose Better Career with TechAge Academy
Choose Better Career with TechAge Academy, We Provide best live project based 6 Months,3 months, 2 Months, 2 Weeks, 4 weeks,6 Weeks Summer/Industrial Training In Noida Location.We are also Provide Winter,Summer Industrial, Corporate Training IN Noida Delhi/NCR. call now For Free demo classes : +91-9212043532, +91-9212063532.
Contact Details:-TechAge Labs Academy
C-46 Ground Floor, Sector-2, Noida-201301.
Phone no.: 0120-6495333
Email : info@techagelabs.com
Website : http://www.techageacademy.com
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
2. • This is my personal initiative to
promote CCDE program
• No endorsement from CCDE team
• No guarantee you will pass the
exam after you follow the suggested
study plan
• Any Cisco Live material used in this
session is only a subset and the
modified version
• No NDA question, please
Jawdat 2012
2
3. About Me
The Real Design Expert
About CCDE (Cisco Live Techtorial)
My CCDE Experience
How to Prepare for CCDE
Project DEW
Jawdat 2012
3
14. Capture customer requirements, current network
design, today's challenges and future requirements
C
Identify what customer wants vs. what customer
I needs, identify the root cause of today's challenges
Solve today's challenges, address current and
S future requirements with the proposed design
Communicate the proposed design to customer to
C get feedback and discuss more design options
Optimize the design to achieve the best suitable
O solution for the customer
Jawdat 2012
14
19. • Basic design is no longer widely taught or practiced
- It just works
- It‘s easy
- It‘s not exciting, it‘s just plumbing
- It‘s not new
• And yet...
Basic design problems still crop up
―Exciting stuff‖ doesn‘t work without a solid routed design
We spend far too much time and money managing failures in basic design work
Jawdat 2012
19
20. • Create a certification relevant to designers
• Provide a baseline set of skills
Builds on top of these skills, not in lieu of them
Encourages picking up ―skipped skills‖
• Encourage end-to-end (big picture) design thinking
Places in the Network are great, within the framework of a running network
Technologies are great, but need to be used for larger design goals
Jawdat 2012
20
20
21. • Interact horizontally with middle level
business management
• Understand impact of business
decisions and direction on design
Jawdat 2012
21
21
22. • Where is this network now?
• What changes do I need to make
to....
Merge these networks?
Implement this application?
Provide security?
Prepare for the next five years?
Jawdat 2012
22
22
23. • How do I transition the network?
Business hurdles?
Technical hurdles?
People hurdles?
Jawdat 2012
23
23
24. • Validates skills in job roles, including:
Senior Network Designer and
Architect
Network Lead for Enterprise IT
Infrastructure Team
Network Lead for Enterprise
Architecture Team
• Emphasizes network design
principles at the routing layer as well
as the ability to assess and translate
network business requirements into
technical designs
Jawdat 2012
24
24
25. • This is not a business test
There is no ―budget‖ for any given
problem
• But—there are business problems on
the test
Business problems provide the
primary structure
Business problems provide the
primary driver towards specific
technology solutions
Jawdat 2012
25
25
26. Senior Network Designer
•Large scale network design
•Variety of business environments
•Troubleshoots and resolves
design level issues
Network Designer
•Moderate scale networks
•Narrow set of business
environments
•Designs components of larger
networks
Junior Network Designer
•Understands network design
fundamentals
•Designs components of
medium and large scale networks
Jawdat 2012
26
26
29. Certification Process
CCDE Practical Exam
352-011
CCDE
Written
Exam
352001
Section One
pass
Section Two
pass
Lunch
Section Three
Section Four
Jawdat 2012
29
29
30. • Location: Pearson VUE Test
Centers
• Pre-requisite: None, though
following is recommended:
• Cost: $350 USD
minimum of seven (7) years job
experience in network engineering
• Duration: 2 hours
thorough understanding of networking
infrastructure principles
• Format: 90-110 items
Multiple Choice
in-depth understanding of the topics
in the exam blueprints on CLN
Drag & Drop
Scored & non-scored items
NO ―skip question‖, NO ―go back‖
Jawdat 2012
30
30
35. • How to Keep CCDE Written Valid
Initial attempt of CCDE Practical
Pass CCDE Written
must be within 18 months of
passing CCDE written
CCDE Written exam attempt must
Candidates who do not pass CCDE
be valid
Practical must re-attempt CCDE
Practical within 12 months of last
scored attempt
Candidates who do not pass CCDE
Practical within three years of
passing CCDE Written must retake
• To maintain active CCDE
the CCDE Written before being
status, CCDEs are required to pass
allowed to re-attempt CCDE
expert-level certification exam every 24
Practical
months
After 24 months, CCDE is suspended.
Suspended candidates have one year to
recertify with CCDE Written else all
• To take exam, candidate must:
Jawdat 2012
35
35
36. • Unlike CCIE, there is partial score in CCDE
• Exam results scored after each administration; Candidates receive results PASS or FAIL
immediately at the end of exam!
It seems like now it‘s only automated grading using scoring rubrics and statistical
analysis (no manual grading)
Some items are worth multiple points, with partial scoring
Some items have multiple solutions
Must achieve minimum score to pass
• Once you pass, it may take several days to get your CCDE number
Jawdat 2012
36
36
37. PIM SM
PIM RP
MSDP
PIM SM
PIM RP
MSDP
PIM SM
PIM RP
MSDP
PIM SM
PIM RP
MSDP
PIM SM
PIM RP
MSDP
PIM SM
PIM RP
MSDP
Jawdat 2012
37
37
38. PIM SM
PIM RP
MSDP
PIM SM
PIM RP
MSDP
PIM SM
PIM RP
MSDP
PIM SM
PIM RP
MSDP
PIM SM
PIM RP
MSDP
PIM SM
PIM RP
MSDP
Jawdat 2012
38
38
39. Note which requirements each technology listed below would fulfill
LISP Traffic Security
Requirements
LISP Routing Security
Requirements
SLA Requirements
L3VPN (MPLS)
L2TPv3
VPLS (MPLS)
GRE Tunnels
Jawdat 2012
39
39
40. Note which requirements each technology listed below would fulfill
LISP Traffic Security
Requirements
LISP Routing Security
Requirements
SLA Requirements
L3VPN (MPLS)
L2TPv3
VPLS (MPLS)
GRE Tunnels
Jawdat 2012
40
40
42. • CCDE Blueprints:
represent important high-level designspecific topics
assessed by CCDE Written and
CCDE Practical exams
• Exam questions are aligned to
blueprints in order to assess
candidates‘ expert-level designrelated skills, knowledge, and abilities
Exam
URL
CCDE
Written
https://learningnetwork.cisco.
com/community/certifications/
ccde/written_exam?tab=2
https://learningnetwork.cisco.
CCDE
Practical com/community/certifications/
ccde/practical_exam?tab=stu
dylearn
Jawdat 2012
42
42
47. • Essentially…
Any published RFC implemented by more than one vendor
Any common industry technology
Any common industry practice
EIGRP (may see LISP, OTV, DMVPN too)
• You do not ―go forth and configure‖
This is higher level than the ―?‖
• This is not about choosing the right equipment in the right place
Hardware limitations only come in at a high level
Jawdat 2012
47
47
48. Layer 2 Control Plane
Spanning Tree vs. L2 Fabric
Down Detection, Failure Domain, Multicast
First Hop Redundancy + Spanning Tree
Layer 3 Control Plane
OSPF, IS-IS, EIGRP, BGP, PIM SM/SSM/Bidir
Application (MTU, IP vs. MPLS), Routing,
Scaling, Interprovider, Traffic Engineeing
New technology: LISP, DMVPN
Quality of Services
Classification, CBWFQ, WRED, Shaping
QoS model, hierarchical, QoS inside tunnel
Network Management
Modularity, Hierarchy, Resiliency (HA/FC)
FCAPS, SNMP, Syslog, Netflow, RMON
Choosing a core
In-band, OOB, Baseline
Network Virtualization
802.1q, MPLS L3 vs. L2, L2TPv3, IPSec, GRE
Security
DoS, GTSM, RPF, IPSec, Infra, QoS, RTBH
Jawdat 2012
48
48
49. • How rapidly does the business
change?
• What is the business sizing model
(growth/downsize/steady)?
• What are the key business
processes?
• What is the business‘ attitudes
towards the network?
Jawdat 2012
49
49
50. • What are the key applications on the
network?
• What are the characteristics of this
set of applications?
Bandwidth requirements?
Tolerance for delay?
Tolerance for jitter?
Tolerance of network reconvergence?
Jawdat 2012
50
50
51. • What‘s the bandwidth?
• What‘s the delay profile?
• What‘s the jitter profile?
• How fast does layer 3 learn about a
failure?
Jawdat 2012
51
51
52. • All of these drivers meet at layer
3, the control plane
This is why the CCDE is a control
plane driven test
If you can‘t do layer 3, you can‘t build
a network that will support business
requirements and applications on top
of available links and hardware
• The control plane provides the tools
to bring layer 9, layer 7, and layer 1
together
Jawdat 2012
52
52
54. • Why would you configure A as ABR?
To reduce Router B‘s routing table
size
To reduce the complexity of the full
mesh
To reduce the impact of Router B
failing at Router C
To reduce the total time required to
run SPF at Router A
ABR?
Jawdat 2012
54
54
55. • When using any form of IPSec over GRE tunneling (for instance, DMVPNs) over a public
or private network, how many routing instances will you need to provide full reachability?
One
Two
Three
Four
Jawdat 2012
55
55
56. • Which would you deploy to increase the throughput of multiple TCP traffic flows on a
single link?
Head of queue dropping
Traffic Policing
Weighted RED
Traffic Shaping
Jawdat 2012
56
56
58. • A single network infrastructure to lower cost
Jawdat 2012
58
58
59. • Privacy protection
for customers
• No client-to-client leakage
Routing separation
Traffic separation
• Resilience and fast convergence
Jawdat 2012
59
60. • Traffic must pass
through a firewall
between the client
and the data center
• Client routes carried in
BGP, not in local IGP
• Traffic carried outside
the LISP network will be
carried in SSL or IPsec
Jawdat 2012
60
60
62. • Holey Doughnuts has done a security audit
• Their auditors discovered they can reach servers not belonging to Holey Doughnuts!
They specifically mention being able to reach the servers used by SuperExcel
They note there are routes they don‘t recognize on their CE
Jawdat 2012
62
62
63. • Is Holey Doughnut‘s ability to see routes
from SuperExcel, and reach SuperExcel‘s servers, a problem that needs to be
addressed by LISP?
Yes
No
Jawdat 2012
63
63
65. • This Is Not a Problem LISP Needs to Solve
• Why don‘t you think this is a problem that needs to be addressed by LISP?
Holy Doughnut‘s engineers cannot get to SuperExcel‘s data, so this is not a breach
of the SLA
Holy Doughnuts should address this by reconfiguring their route and packet filters
The LISP Service Level Agreement with Holy Doughnuts does not cover this
situation
The LISP engineering team has bigger things to worry about than this problem
Jawdat 2012
65
65
66. • This Is Not a Problem LISP Needs to Solve
• Why don‘t you think this is a problem that needs to be addressed by LISP?
Holy Doughnut‘s engineers cannot get to SuperExcel‘s data, so this is not a breach
of the SLA
Holy Doughnuts should address this by reconfiguring their route and packet filters
The LISP Service Level Agreement with Holy Doughnuts does not cover this
situation
The LISP engineering team has bigger things to worry about than this problem
Jawdat 2012
66
66
67. • This Is a Problem LISP Needs to Solve
• Why do you think this problem needs to be addressed by LISP?
LISP should not be leaking the SuperExcel routes to their other clients
LISP should not be allowing telnet traffic from Holey Donuts to SuperExcel‘s
servers
LISP is not fulfilling their service level agreement correctly
Jawdat 2012
67
67
68. • This Is a Problem LISP Needs to Solve
• Why do you think this problem needs to be addressed by LISP?
LISP should not be leaking the SuperExcel routes to their other clients
LISP should not be allowing telnet traffic from Holey Donuts to SuperExcel‘s
servers
LISP is not fulfilling their service level agreement correctly
Jawdat 2012
68
68
69. • Which solution would resolve this problem in a way that supports both the SLA and the
LISP business model?
Using Policy Based Routing to separate customer traffic
Creating a physical per customer to separate customer traffic
Provisioning a separate virtual topology per customer
Configuring a separate IGP instance per customer to separate customer routes
Jawdat 2012
69
69
70. • Which solution would resolve this problem in a way that supports both the SLA and the
LISP business model?
Using Policy Based Routing to separate customer traffic
Creating a physical per customer to separate customer traffic
Provisioning a separate virtual topology per customer
Configuring a separate IGP instance per customer to separate customer routes
We need traffic separation as well a routing separation
Jawdat 2012
70
70
71. • A single network infrastructure to lower cost
Jawdat 2012
71
71
72. • What additional piece of information would you need to determine which virtualization
service you would use to separate customer traffic in this network?
The tunneling technologies the firewalls support
The tunneling technologies the call managers support
Tunneling technology used to connect to customer CEs
Jawdat 2012
72
72
73. • From time to time during the test, you will be asked what further information you need to
complete the task
• If you already have a specific piece of information, don‘t ask for it!
This might not match ―real life‖ as well as you‘d like
But the question is trying to evaluate whether or not you know the information you
need to solve the problem
• This is one of the analytical skills the test is designed to measure
Jawdat 2012
73
73
77. • Technical Skills
L2 Control plane, L3 Control plane, Tunneling/Virtualization, QoS, Network Management and Security
• Design/Project/Customer skills
Capture and analyze requirement
Develop network design
Implement network design
Validate and optimize network design
• Plus Network Design experiences, in multiple technologies as well as from vertical and
different industries like SP, Enterprise, Financial, Retail and so on
Jawdat 2012
77
78. Why, when, and where to use which technology to answer requirements?
•
•
•
•
•
First step: Gap analysis for
technical skills
CCDE Written is the benchmark
CCIE means no need to read
many technical books anymore
Possess design experience with
SP and Large Enterprise with
Cisco Advanced Services
Possess design experience with
Enterprise, Education, Finance,
Government with Cisco partner
CCIE +
Experience
•
•
•
•
•
•
Watch almost 40 Cisco Live
recording videos
Read several Cisco Live slides
Skim Cisco Design Zone
Only read CCDE Quick
reference for written
Read Optimal Routing Design
to understand Russ White
Skim Definitive MPLS Network
Design for sample scenarios
Cisco
Live, CVD, b
ook
•
•
•
•
•
•
•
•
•
•
Comparing L2 design option
Failure domain in Layer 2
Which IGP Routing Protocol
Modular and Hierarchy design
Fast Convergence, HA
Which Tunneling mechanism
MPLS L3VPN vs. L2VPN
Different QoS scenarios
Which Management tool
Refresh Security concept
Practice
Scenarios
33 Days since Gap analysis
Jawdat 2012
78
81. • Get CCIE
• Get Real Design Experience
• Ask ―Why CCDE?‖ -> motivation
• Pass Written, Book Seat
• Understand the exam creator, Russ White
• Read Books, Watch Cisco Live, Skim CVDs
• Take Practical Exam
• After Fail, Gap Analysis of Technical Skills
• Re-take Until Pass
http://www.himawan.nu/2013/05/how-to-become-ccde.html
Jawdat 2012
81
81
82. CCIE is not required, but will make it easier
• You still need to have a good reason to do it
―why CCDE?‖ -> motivation
• You still need real design experience
Especially for Job Tasks: Analyze requirement,
Develop, Implement, Validate and Optimize
• Self-assess the Technology topics
Use CCDE Written Blueprint as guidance
• Pass written, book seat immediately
• Read, or watch from CiscoLive365.com
• Think beyond configuration for Technology
Think about Task Domain: Merge/Divest, Add,
Replace, Scaling for each technology
• Master the skill of ―skimming‖
• Take Practical Exam
http://www.himawan.nu/2013/07/how-to-prepare-for-ccde-practical-exam.html
Jawdat 2012
82
82
84. How to Learn Anything… Fast?
• Chose lovable project
• One skill at a time
• Target performance
level
• Remove barriers to
practice
• Make time
• Fast feedback loops
• Deconstruction
• Practice in short bursts
• Obtain critical tools
• Quantity and speed
www.first20hours.com
Jawdat 2012
84
84
86. Use References as Feedback in Learning
• Cisco Validated Design
• Cisco Documentation
• Cisco Learning Network
• Cisco Live Sessions
• RFC
• Study Group
• CCDE Written
• Design Expert Community
Jawdat 2012
86
86
87. Identify and Remove Barriers in Learning
• Do you have Internet access?
• Do you have Cisco Learning Login?
• Do you have study materials?
• Do you have access to Cisco Live recorded sessions?
• Do you have place to study?
• Do you have allocated time?
Jawdat 2012
87
87
88. First 20 (or more) Hours to Build Habit
• Make time!
• The first few hours is the most difficult
• Remember Newton‘s first law: An object that is at rest will stay at rest unless an external
force acts upon it
• Study in daily basis
• Be consistent in study and maintain the pace
• Try to get experience to apply what you learn during the study
Jawdat 2012
88
88
91. • Onsite Bootcamp
Jeremy Filiben 5-day for $4995
Fast Lane 5-day for $4995
DEW $700 per weekend x 3 = $ 2100 for 6 days
Teach real skills, not exam-focused, onsite class available in APAC and EMEA
Eligible to join FaceBook group ―Design Expert Warriors – DEW Community‖
• Online/Exam Focus
INE 3-day for $ 995
Jeremy Filiben Self-paced for $995
• Best of both world: DEW + Others
3x weekend DEW + Jeremy self-paced = $2945
3x weekend DEW + Jeremy self-paced + INE 3-day = $3940
Jawdat 2012
91
91
96. • DEW: Routing (3-4 Jan, Riyadh)
IGP IPv4/IPv6, OSPF, IS-IS, EIGRP, BGP, scaling, inter-AS, HA, and include
PIM, ASM, SSM Multicast
• DEW: Tunneling (24-25 Jan, Dubai)
MPLS-based L3VPN/L2VPN, tunnel protection/MPLS TE, other tunneling
mechanism include IPv6 transition
• DEW: SP Design (March, Asia)
Physical, L2, IGP/BGP/LDP/PIM transport, MPLS
services, Internet, IPTV, HA, QoS, security, management
• DEW: ENT Design (TBD)
Jawdat 2012
96
97. • Technology Background Theory
• Design Aspect of Technology
• Questions on Each Topic
• Homework and Discussion
• CCDE-like Design Scenarios
What?
Why?
How?
Which One to Use? When and Where?
Jawdat 2012
97
100. • Only one book for CCDE written
This is essentially the written
blueprint ―explained‖
The technologies covered on both
the written and the practical are
the same
The written blueprint is focused
on the technology, the practical on
analysis
Jawdat 2012
100
100
103. Watch the core technology: IGP, Tunneling, and WAN Concept design
- BRKRST-2310 Deploying OSPF in a Large Scale Network
- BRKIPM-3010 Which Routing Protocol? IPv4 and IPv6
- BRKIPM-2444 EIGRP – An in depth look at the Protocol
- BRKMPL-2101 Deploying L2 Based MPLS VPN
- BRKCCIE-3345 CCIE Candidate Introduction to MPLS L3VPN
- BRKCRS-2041 Enterprise WAN Architectures and Design Principles
- BRKMPL-2109 MPLS Solutions for Cloud Networking
- BRKRST-2042 Highly Available Wide Area Network Design
Watch Campus design and QoS:
- BRKCRS-2661 Designing Layer 2 Networks - Avoiding Loops, Drops, Flooding
- BRKCRS-2031 Multilayer Campus Architectures and Design Principles
- BRKRST-2501 Enterprise QoS or BRKCRS-2500 Campus QoS
You may want to "speed watching" the following:
- BRKSEC-4054 DMVPN Deployment Model
- BRKRST-2301 Enterprise IPv6 Deployment
- BRKSEC-2000 Secure Enterprise Design
- BRKMPL-1261 IP Multicast Concept Design and Troubleshooting
Some Cisco Live sessions that were not recorded, but slides are available:
- BRKRST-2335 IS-IS Network Design and Deployment - BRKIPM-2261 Deploying IP Multicast
- BRKMPL-2105 Inter-AS MPLS Solutions
- TECSEC-2011 IPSec and SSL VPNs
Jawdat 2012
103
103
If you haven’t entered a voucher or promotion code for 100% of the exam cost, your exam appointment cannot be completed without making payment. Pearson VUE accepts the following major credit cards: VISA, MasterCard, American Express and JCB. (Due to international verification issues, debit cards are not accepted.)
Pearson VUE Professional Testing CentersStandard Locations: ChicagoLondonAdditional Locations (vary based on testing window)Hong KongSydneyBangalore