Practical Exam v2.0 Update
The last day to test using the CCDE Practical Exam v1.0 is October
21, 2011.
Candidates who are intending to take practical exams
after October
22, 2011 should prepare using the
CCDE Practical Exam Topics v2.0. The CCDE Practical Exam v2.0
is scheduled for its first administration at the end of March 2012.
**********************************************************
CCDE Written Exam Topics v2.0
The
Cisco CCDE written exam topic areas listed are general guidelines for the type
of content that is likely to appear on the exam. Please note, however, that
other relevant or related topic areas may also appear on the CCDE written
exam.
Exam Sections and Sub-task Objectives
1.00
|
Layer 2 control plane |
1.01
|
Describe fast convergence techniques and mechanisms |
1.01.1
|
Down detection |
1.01.2
|
Interface dampening |
1.02
|
Describe loop detection and mitigation protocols |
1.02.1
|
Spanning tree types |
1.02.2
|
Spanning tree tuning techniques |
1.03
|
Describe mechanisms that are available for creating loop-free
topologies |
1.03.1
|
REP |
1.03.2
|
Multipath |
1.03.3
|
Switch clustering |
1.03.4
|
Flex links |
1.03.5
|
Loop detection and mitigation |
1.04
|
Describe the impact of transport mechanisms and their interaction with
routing protocols over different types of links |
1.05
|
Describe multicast routing concepts |
1.06
|
Describe the impact of fault isolation and resiliency on network
design |
1.06.1
|
Fault isolation |
1.06.2
|
Fate sharing |
1.06.3
|
Redundancy |
1.06.4
|
Virtualization |
1.06.5
|
Segmentation |
2.00
|
Layer 3 control plane |
2.01
|
Describe route aggregation concepts and techniques |
2.01.1
|
Purpose of route aggregation |
2.01.2
|
When to leak routes/avoid suboptimal routing |
2.01.3
|
Determining aggregation location and techniques |
2.02
|
Describe the theory and application of network topology
layering |
2.02.1
|
Layers and their purposes in various environments |
2.03
|
Describe the theory and application of network topology
abstraction |
2.03.1
|
Purpose of link state topology summarization |
2.03.2
|
Use of link state topology summarization |
2.04
|
Describe the impact of fault isolation and resiliency on network design or
network reliability |
2.04.1
|
Fault isolation |
2.04.2
|
Fate sharing |
2.04.3
|
Redundancy |
2.05
|
Describe metric-based traffic flow and modification |
2.05.1
|
Metrics to modify traffic flow |
2.05.2
|
Third-party next hop |
2.06
|
Describe fast convergence techniques and mechanisms |
2.06.1
|
Protocol timers |
2.06.2
|
Loop-free alternates |
2.07
|
Describe factors affecting convergence |
2.07.1
|
Recursion |
2.07.2
|
Microloops |
2.07.3
|
Transport |
2.08
|
Describe unicast routing protocol operation (OSPF, EIGRP, IS-IS, BGP, and
RIP) in relation to network design |
2.08.1
|
Neighbor relationships |
2.08.2
|
Loop-free paths |
2.08.3
|
Flooding domains and stubs |
2.08.4
|
iBGP scalability |
2.09
|
Analyze operational costs and complexity |
2.09.1
|
Routing policy |
2.09.2
|
Redistribution methods |
2.10
|
Describe the interaction between routing protocols and
topologies |
2.11
|
Describe generic routing and addressing concepts |
2.11.1
|
Policy-based routing |
2.11.2
|
NAT |
2.11.3
|
Subnetting |
2.11.4
|
RIB-FIB relationships |
2.12
|
Describe multicast routing concepts |
2.12.1
|
General multicast concepts |
2.12.2
|
Source specific |
2.12.3
|
MSDP/anycast |
2.12.4
|
PIM |
2.12.5
|
mVPN |
2.13
|
Describe IPv6 concepts and operation |
2.13.1
|
General IPv6 concepts |
2.13.2
|
IPv6 security |
2.13.3
|
IPv6 transition techniques |
3.00
|
Network virtualization |
3.01
|
Describe Layer 2 and Layer 3 tunneling technologies |
3.01.1
|
Tunneling for security |
3.01.2
|
Tunneling for network extension |
3.01.3
|
Tunneling for resiliency |
3.01.4
|
Tunneling for protocol integration |
3.01.5
|
Tunneling for traffic optimization |
3.02
|
Analyze the implementation of tunneling |
3.02.1
|
Tunneling technology selection |
3.02.2
|
Tunneling endpoint selection |
3.02.3
|
Tunneling parameter optimization of end-user applications |
3.02.4
|
Effects of tunneling on routing |
3.02.5
|
Routing protocol selection and tuning for tunnels |
4.00
|
Design considerations |
4.01
|
Analyze various Quality of Service (QoS) performance metrics |
4.01.1
|
Application requirements |
4.01.2
|
Performance metrics |
4.02
|
Describe types of QoS techniques |
4.02.1
|
Classification and marking |
4.02.2
|
Shaping |
4.02.3
|
Policing |
4.02.4
|
Queuing |
4.03
|
Identify QoS strategies based on customer requirements |
4.03.1
|
DiffServ |
4.03.2
|
IntServ |
4.04
|
Identify network management requirements |
4.05
|
Identify network application reporting requirements |
4.06
|
Describe technologies, tools, and protocols used for network
management |
4.07
|
Describe the reference models and processes used in network management,
such as FCAPS, ITIL, and TOGAF |
4.08
|
Describe best practices for protecting network
infrastructure |
4.08.1
|
Secure administrative access |
4.08.2
|
Control plane protection |
4.09
|
Describe best practices for protecting network services |
4.09.1
|
Deep packet inspection |
4.09.2
|
Data plane protection |
4.10
|
Describe tools and technologies for identity management |
4.11
|
Describe tools and technologies for 802.11 wireless
deployment |
4.12
|
Describe tools and technologies for optical deployment |
4.13
|
Describe tools and technologies for SAN fabric
deployment |
- end-
************************************************
Expansion of the CCDE Practical Exam v2.0 Exam Topics
1.00 Analyze design requirements
1.01 Analyze business requirements, conflicts, and constraints
1.01.1 Op-Ex and Cap-Ex
1.01.2 Project goals
1.01.3 Lifecycle and return on investment (ROI)
1.01.4 Business environment
1.01.5 Compliance and policy
1.02 Analyze technical requirements, conflicts, and constraints
1.02.1 Application requirements
1.02.2 Compliance and policy
1.03 Analyze physical requirements
1.03.1 Topology implications
1.03.2 Operational requirements
1.03.3 Analyze business and technical risks
1.04 Analyze existing network
1.04.1 Network documentation
1.04.2 Network infrastructure and its impact on network design
2.00 Develop network designs
2.01 Identify the technology to resolve a specific design problem
2.01.1 Functional specifications
2.01.2 Network designs
2.01.3 Operational considerations
2.02 Analyze the impact on the existing network and services
2.02.1 Functional specifications
2.02.2 Network designs
2.02.3 Operational considerations
2.03 Incorporate best practices within the network design
2.03.1 Avoidance of over-engineering
2.03.2 Consistent and modularized solution sets throughout the network
2.03.3 Industry best practices
2.04 Incorporate business requirements within the network design
2.04.1 Op-Ex and Cap-Ex
2.04.2 Lifecycle and return on investment (ROI)
2.04.3 Compliance and policy
3.00 Implement network design
3.01 Analyze implementation options
3.01.1 Impact on design
3.01.2 Impact on performance, availability, and network management
3.01.3 Impact on the business
3.01.4 Risk and consequence for a given implementation plan
3.02 Design an implementation plan
3.02.1 Interdependencies between services, failure domains, and other
architectural elements
3.02.2 Implementation timeline and steps
3.02.3 Contingency plans for network restoration
4.00 Validate and optimize network design
4.01 Analyze design choices based on specifications
4.01.1 Impact of implementing changes to the original design
4.01.2 Impact of different design solutions created by new drivers
4.02 Validate design
4.02.1 Test strategy
4.02.2 Performance metrics and baselines
4.03 Optimize design
4.03.1 KPI
4.03.2 Baselines