دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: شبکه سازی ویرایش: نویسندگان: Nicholas Russo سری: ISBN (شابک) : 0692747370, 9780692747377 ناشر: سال نشر: 2016 تعداد صفحات: 2930 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 16 مگابایت
در صورت تبدیل فایل کتاب CCIE Service Provider Version 4 Written and Lab Exam Comprehensive Guide به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب راهنمای جامع آزمون کتبی و آزمایشگاهی CCIE Service Provider نسخه 4 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
1. SP architecture concepts 1.1 IPv6 1.1.1 Definitions 1.1.2 Neighbor Discovery details 1.2 Broadband Aggregation (BBA) 1.2.1 PPP over Ethernet (PPPoE) technology 1.2.2 Multi-service PPPoE and LAC/LNS architecture 1.3 MEF Ethernet Services Definitions (MEF 6.2) 1.4 Platform Architecture 1.4.1 Route-Switch Processor (RSP) and Route Processor (RP) 1.4.2 Line cards (LC) 1.4.3 Switching fabric / backplane and forwarding model 1.4.4 Multicast forwarding and hierarchical replication 1.4.5 Satellite operations (remote linecards) 3.1 WAN technologies 3.1.1 Packet over SONET/SDH 3.1.2 T1/E1 and T3/E3 3.1.3 Dense Wavelength Division Multiplexing (DWDM) 3.2 IP connectivity to the customer 3.2.1 Digital Subscriber Line (DSL) 3.2.2 Cable Internet 3.2.3 Wireline 4. Virtualization concepts 4.1 SVR vs. HVR 4.2 Network Functions Virtualization (NFV) 4.3 Software Defined Networking (SDN) 5. Mobility concepts 5.1 LTE 5.2 Backhaul 6. Describe BGP path attributes 7. Describe MPLS forwarding and control plane mechanisms 7.1 Label Distribution Protocol (LDP) 7.2 Static label bindings 7.3 MPLS IP and MTU minor options 8. Describe MPLS advanced features 8.1 Segment Routing 8.2 Generalized MPLS (GMPLS) 8.3 MPLS Transport Profile (MPLS-TP) 8.4 Inter-AS MPLS 8.4.1 Option A (Back to back VRF exchange) 8.4.1.1 L3VPN 8.4.1.2 L2VPN 8.4.1.3 MVPN – GRE (Profile 0) and mLDP (Profile 1) 8.4.1.4 MPLS TE 8.4.1.5 Confederation variation 8.4.1.6 Carrier Supporting Carrier (CSC) variation 8.4.2 Option B (ASBR VPNv4/v6 eBGP) 8.4.2.1 L3VPN 8.4.2.2 L2VPN 8.4.2.3 mVPN – GRE (Profile 0) 8.4.2.4 MVPN – mLDP (Profile 17) 8.4.2.5 MPLS TE 8.4.2.6 Confederation variation 8.4.3 Option C (ASBR eBGP + Label, RR VPNv4 eBGP) 8.4.3.1 L3VPN 8.4.3.2 L2VPN 8.4.3.3 MVPN – GRE (Profile 0) 8.4.3.4 MVPN – mLDP (Profile 17) 8.4.3.5 MPLS TE 8.4.3.6 Confederation variation 8.4.4 Option AB Inter-AS hybrid (AKA Option D) 8.4.4.1 L3VPN 8.4.4.2 L2VPN 8.4.4.3 MVPN – GRE (Profile 0) and mLDP (Profile 1) 8.4.4.4 MPLS TE 8.4.5 Confederation variation 9. Describe multicast P2MP TE 10. Describe EVPN (EVPN and PBB-EVPN) 10.1 EVPN 10.2 PBB-EVPN 11. Describe IEEE 802.1ad (QinQ), IEEE 802.1ah (Mac-in-Mac), and ITU G.8032 (REP) 11.1 802.1ad QinQ 11.2 802.1ah MAC in MAC (Provider Backbone Bridges) 11.3 Ethernet Ring loop-prevention 11.3.1 Cisco Resilient Ethernet Protocol (REP) 11.3.2 ITU G.8032 12. Describe broadband forum TR-101 VLAN paradigms (N:1 and 1:1) 13. Describe QoS link fragmentation (LFI), cRTP, and RTP 14. Describe Multichassis/Clustering High Availability (HA) 14.1 High Availability (HA) Demonstration (NSF/NSR/GR) 14.1.1 IS-IS NSF and NSR 14.1.2 OSPFv2 NSF and NSR 14.1.3 OSPFv3 GR and NSR 14.1.4 BGP GR and NSR 14.1.5 LDP GR and NSR 14.1.6 RSVP-TE GR 14.1.7 EIGRP NSF 15. Describe Layer 1 failure detection 16. Describe BGPsec 17. Describe backscatter traceback 18. Describe lawful-intercept 19. Describe BGP Flowspec 20. Describe DDoS mitigation techniques 21. Describe network event and fault management 22. Describe performance management and capacity procedures 23. Describe maintenance and operational procedures 24. Describe the network inventory management process 25. Describe network change, implementation, and rollback 25.1 Processes and best practices 25.2 NETCONF and YANG 26. Describe the incident management process based on the ITILv3 framework 27. Describe, implement, and troubleshoot advanced BGP features 27.1 Additional Paths (add-path) and Prefix Independent Convergence (PIC) 27.2 BGP RT-filter unicast / IPv4 RT-filter feature 27.3 BGP RR-group and Selective RT Retention 27.4 Accumulated IGP attribute 27.4.1 Basic AIGP 27.4.2 AIGP with cost-communities and BGP confederations 27.5 Cost-Community / Point Of Insertion (POI) 27.6 DMZ Link Bandwidth 27.7 BGP Multicast VPN (MVPN) Theory 27.8 BGP Link State AF and Path Computation Element (PCE) 28. Describe, implement, and troubleshoot MVPN 28.1 Profile 0: Default MDT − GRE − PIM C−mcast Signaling (Traditional Draft-Rosen) 28.1.1 PIM-ASM in the core 28.1.2 PIM-SSM in the core 28.1.3 PIM-Bidir in the core 28.2 Profile 1: Default MDT − MLDP MP2MP − PIM C−mcast Signaling (Basic mLDP) 28.3 Profile 3: Default MDT − GRE − BGP−AD − PIM C−mcast Signaling 28.4 Profile 6: VRF MLDP − In−band Signaling 28.5 Profile 7: Global MLDP In−band Signaling 28.6 Profile 8: Global Static − P2MP−TE 28.7 Profile 9: Default MDT − MLDP − MP2MP − BGP−AD − PIM C−mcast Signaling 28.8 Profile 10: VRF Static – P2MP TE - BGP−AD 28.9 Profile 11: Default MDT − GRE − BGP−AD − BGP C−mcast Signaling 28.10 Profile 12: Default MDT − MLDP − P2MP − BGP−AD − BGP C−mcast Signaling 28.11 Profile 13: Default MDT − MLDP − MP2MP − BGP−AD − BGP C−mcast Signaling 28.12 Profile 14: Partitioned MDT – MLDP P2MP – BGP-AD – BGP C-mcast signaling 28.13 Profile 17: Default MDT – MLDP P2MP – BGP-AD – PIM C-mcast signaling 29. Describe and optimize multicast scale and performance 29.1 Inter-AS Multicast and Multicast Source Discovery Protocol (MSDP) 29.2 Multicast Only Fast Re-Reroute (MoFRR) 29.3 Protecting mLDP LSPs with Fast Re-Reoute (FRR) 29.4 MVPN Extranet 29.4.1 PIM/GRE 29.4.2 mLDP 30. Describe, implement, and troubleshoot MPLS QoS models and related features 30.1 Uniform 30.2 Short pipe 30.3 Pipe (AKA long pipe) 30.4 QoS Policy Propagation through BGP (QPPB) 30.5 QoS specifics on IOS XRv 30.6 Network Based Application Recognition (NBAR) summary and configurations 30.6.1 NBAR Custom Protocols 30.6.2 NBAR Attributes 30.6.3 NBAR Attributes with HTTP 30.6.4 NBAR Protocol-ID 30.6.5 NBAR Protocol Discovery 31. Describe, implement, and troubleshoot MPLS TE / QoS mechanisms 31.1 MPLS RSVP-TE (General) 31.1.1 TE Topology (TED) construction and RSVP-TE signaling 31.1.2 TE attributes 31.1.3 Directing traffic into TE tunnels and tunnel stitching 31.2 TE Fast-ReRoute (FRR) and rapid provisioning 31.2.1 Link (NHOP), Node (NNHOP), and Path protection – Manual 31.2.2 Automatic tunnels (with OSPF) 31.3 CBTS (IOS) and PBTS (XR) 31.4 DiffServ-aware Traffic Engineering (DS-TE) 31.4.1 Pre-standard Model 31.4.2 IETF Russian Dolls Model (RDM) 31.4.3 IETF Maximum Allocation Model (MAM) 31.4.4 Per-VRF TE techniques 32. Describe, implement, and troubleshoot E-LAN and E-TREE (extended to general L2VPN) 32.1 MPLS encapsulated L2VPN 32.1.1 Static configuration 32.1.1.1 E-LINE (VPWS) 32.1.1.2 Advanced PW features (CW, Status, etc) 32.1.1.3 E-LAN and E-TREE (VPLS) 32.1.1.4 Multisegment PW (MS-PW) switching 32.1.1.5 EVC rewrite operations 32.1.2 BGP auto-discovery for VPWS/VPLS 32.1.2.1 LDP signaling 32.1.2.2 BGP signaling 32.1.3 Hierarchical VPLS (H-VPLS) 32.1.3.1 MPLS in the Access Network 32.1.3.2 QinQ in the Access Network 32.2 IP encapsulated L2VPN 32.2.1 E-LINE with L2TP 32.2.2 E-LAN and E-TREE using OTV 33. Describe, implement, and troubleshoot Unified MPLS and CSC 33.1 Carrier Supporting Carrier (CSC) 33.1.1 L3VPN 33.1.2 L2VPN 33.1.3 MVPN (Profile 0 with SSM) 33.1.4 TE and TE-FRR 33.2 Unified (seamless) MPLS 33.2.1 IS-IS 33.2.1.1 L3VPN 33.2.1.2 L2VPN 33.2.1.3 MVPN (mLDP profiles 1 and 17) 33.2.1.4 Inter-area TE and TE-FRR 33.2.2 OSPF (summarized) 33.2.2.1 L3VPN 33.2.2.2 L2VPN 33.2.2.3 MVPN (mLDP profiles 1 and 17) 33.2.2.4 MPLS TE and TE-FRR 34. Describe, implement, and troubleshoot LISP 35. Describe, implement, and troubleshoot GRE and mGRE-based VPN 35.1 P2P GRE tunneling and GRE features 35.2 Dynamic Multipoint VPN (DMVPN) basics 35.2.1 Phase 1 35.2.2 Phase 2 35.2.3 Phase 3 35.3 mGRE-based L3VPN 36. Describe, implement, and troubleshoot IPv6 transition mechanisms 36.1 NAT44 and NAT444 36.2 NAT64 and NAT464 36.3 Dual stack lite (DS-lite) 36.4 IPv6 tunneling over IPv4 networks 36.4.1 GRE / Manual IPv6 tunnels 36.4.2 6to4 automatic tunnels 36.4.3 6 Rapid Deployment (6RD) 36.4.4 Intra-Site Automatic tunnel Addressing Protocol (ISATAP) 36.5 IPv4/IPv6 Internet Access over MPLS using NAT44 37. Describe, implement, and troubleshoot end-to-end fast convergence 37.1 Loop Free Alternate (LFA) for IPv4 37.1.1 OSPFv2 37.1.1.1 Direct LFA 37.1.1.2 Remote LFA 37.1.2 IS-IS 37.1.2.1 Direct LFA 37.1.2.2 Remote LFA 37.1.3 EIGRP 37.2 Loop Free Alternate (LFA) for IPv6 (XR Only) 37.2.1 OSPFv3 37.2.1.1 Direct LFA 37.2.1.2 Remote LFA 37.2.2 IS-IS 37.2.2.1 Direct LFA 37.2.2.2 Remote LFA 37.3 Convergence optimizations for BGP 37.4 Convergence optimizations for IGPs 37.4.1 IS-IS 37.4.2 OSPFv2 and OSPFv3 38. Describe, implement, and troubleshoot multi-VRF CE and advanced VRF techniques 38.1 Multi-VRF CE (VRF-Lite) 38.1.1 Basic VRF-Lite 38.1.2 OSPF and sham-links 38.1.3 EIGRP and Site-of-Origin (SoO) 38.1.4 IS-IS 38.1.5 BGP and Site-of-Origin (SoO) 38.1.6 Static routing 38.1.7 RIP 38.2 VRF label modes 38.3 VRF selection for traffic leaking 38.4 VRF route leaking 38.5 L3VPN import/export maps 38.6 Half-Duplex VRF (HDVRF) 38.7 BGP Local Convergence (VRF Local Protection) 39. Describe, implement, and troubleshoot Layer 2 failure detection 39.1 Link Aggregation Control Protocol (LACP) 39.2 Uni-Directional Link Detection (UDLD) 40. Describe, implement, and troubleshoot Layer 3 failure detection 40.1 Individual Protocol Hello packets 40.2 Bidirectional Forwarding Detection (BFD) 41. Describe, implement, and troubleshoot control plane protection techniques 41.1 Control Plane Policing (CPP) in XE and Local Packet Transport Services (LPTS) in XR 42. Describe, implement, and troubleshoot logging and SNMP security 42.1 Logging 42.2 SNMP security 43. Describe, implement, and troubleshoot timing 43.1 Network Time Protocol (NTP) 43.2 1588v2 (Precision Time Protocol(PTP)) 43.3 Synchronous Ethernet (SyncE) 44. Describe, implement, and troubleshoot SNMP traps, RMON, EEM, and EPC 44.1 SNMP traps 44.2 Remote Monitor (RMON) in XE and logging correlation in XR 44.3 Embedded Event Manager (EEM) 44.4 Embedded Packet Capture (EPC) 45. Describe, implement, and troubleshoot port mirroring protocols 45.1 Switch port analyzer (SPAN) 45.2 Remote SPAN (RSPAN) 45.3 Encapsulated RSPAN (ERSPAN) 46. Describe, implement, and troubleshoot Netflow and IPFIX 46.1 Flexible Netflow (FNF) 46.2 IPFIX 47. Describe, implement, and troubleshoot IP SLA 47.1 Basic IP SLA probes, responders, features, and configurations 47.2 UDP-jitter and VOIP codec probes 47.3 Advanced ICMP probes 47.4 MPLS probes 47.5 Ethernet probes including ITU-T Y.1731 Basics and Performing Monitoring (PM) 47.6 Miscellaneous probes 47.7 Aggregated statistics, history, group scheduling, and miscellaneous features 47.8 Enhanced Object Tracking (EOT) 47.9 IPv6 SLA 47.10 IOS-XR IP SLA and EOT 48. Describe, implement, and troubleshoot MPLS OAM and Ethernet OAM 48.1 MPLS ping, MPLS traceroute, and VCCV 48.2 MPLS LSP Monitor (MPLSLM) / LSP Health Monitor 48.3 Ethernet Management Tools (CFM, OAM, and E-LMI) 48.3.1 Connectivity Fault Management (CFM) (802.3ag) 48.3.2 Ethernet OAM (IEEE 802.3ah) 48.3.3 Ethernet Local Management Interface (E-LMI) (MEF.16) 48.3.4 Ethernet CFM, OAM, E-LMI, and Y.1731 on CSR1000v (Comprehensive) 49. Service Provider security best practices (Comprehensive) 49.1 Control plane security best practices 49.2 Management plane security best practices 49.3 Data plane security best practices 49.4 Advanced security techniques and features