Cisco Certified Architect (CCAr)
1 **Foundation**
1-1 **Networking Fundamentals**
1-1 1 OSI and TCPIP Models
1-1 2 Network Devices and Their Functions
1-1 3 IP Addressing and Subnetting
1-1 4 Routing and Switching Basics
1-1 5 Network Security Fundamentals
1-2 **Enterprise Architecture**
1-2 1 Enterprise Network Design Principles
1-2 2 Network Segmentation and Zoning
1-2 3 Network Services and Protocols
1-2 4 Network Management and Monitoring
1-2 5 Network Automation and Programmability
2 **Design**
2-1 **Network Design Methodologies**
2-1 1 Design Life Cycle
2-1 2 Requirements Gathering and Analysis
2-1 3 Design Documentation and Validation
2-1 4 Design Implementation and Testing
2-1 5 Design Maintenance and Optimization
2-2 **Enterprise Network Design**
2-2 1 Campus Network Design
2-2 2 Data Center Network Design
2-2 3 WAN Design
2-2 4 Wireless Network Design
2-2 5 Security Architecture Design
3 **Implementation**
3-1 **Network Implementation Planning**
3-1 1 Implementation Strategies
3-1 2 Resource Allocation and Scheduling
3-1 3 Risk Management and Mitigation
3-1 4 Change Management
3-1 5 Post-Implementation Review
3-2 **Network Services Implementation**
3-2 1 IP Address Management (IPAM)
3-2 2 DNS and DHCP Implementation
3-2 3 Network Access Control (NAC)
3-2 4 VPN and Remote Access Implementation
3-2 5 Network Security Services Implementation
4 **Operation**
4-1 **Network Operations Management**
4-1 1 Network Monitoring and Performance Management
4-1 2 Fault Management and Troubleshooting
4-1 3 Capacity Planning and Management
4-1 4 Network Change and Configuration Management
4-1 5 Network Compliance and Auditing
4-2 **Network Security Operations**
4-2 1 Incident Response and Management
4-2 2 Threat Detection and Mitigation
4-2 3 Security Information and Event Management (SIEM)
4-2 4 Vulnerability Management
4-2 5 Security Policy Enforcement and Monitoring
5 **Optimization**
5-1 **Network Optimization Techniques**
5-1 1 Traffic Engineering and Load Balancing
5-1 2 Quality of Service (QoS) Implementation
5-1 3 Network Performance Tuning
5-1 4 Energy Efficiency and Green Networking
5-1 5 Network Optimization Tools and Technologies
5-2 **Network Automation and Orchestration**
5-2 1 Network Programmability and Automation
5-2 2 Software-Defined Networking (SDN)
5-2 3 Network Function Virtualization (NFV)
5-2 4 Automation Tools and Frameworks
5-2 5 Continuous Integration and Continuous Deployment (CICD) for Networks
6 **Leadership**
6-1 **Leadership and Management Skills**
6-1 1 Strategic Planning and Vision
6-1 2 Team Leadership and Development
6-1 3 Communication and Stakeholder Management
6-1 4 Financial Management and Budgeting
6-1 5 Project Management and Execution
6-2 **Professional Ethics and Standards**
6-2 1 Ethical Decision-Making
6-2 2 Industry Standards and Compliance
6-2 3 Intellectual Property and Licensing
6-2 4 Professional Development and Continuous Learning
6-2 5 Global and Cultural Awareness
1.1.4 Routing and Switching Basics

1.1.4 Routing and Switching Basics

1. Routing

Routing is the process of selecting paths in a network along which to send network traffic. Routers are devices that perform this function. They use routing tables to determine the best path for data packets to travel from the source to the destination. Routing protocols such as OSPF (Open Shortest Path First) and BGP (Border Gateway Protocol) help routers dynamically update their routing tables based on network conditions.

An analogy for routing is a GPS system in a car. Just as the GPS finds the best route to a destination, a router finds the best path for data packets to reach their destination.

2. Switching

Switching is the process of forwarding data packets between devices within the same network. Switches operate at the data link layer (Layer 2) of the OSI model and use MAC addresses to determine the destination of each data packet. Unlike hubs, which broadcast data to all devices, switches send data only to the intended recipient, making them more efficient.

Think of a switch as a mail sorter in a post office. The mail sorter ensures that each piece of mail reaches the correct mailbox, just as a switch ensures that data reaches the correct device on the network.

3. Routing Tables

Routing tables are data structures maintained by routers that contain information about the network's topology. Each entry in the routing table includes details such as the destination network, the next hop (the next router in the path), and the metric (a value indicating the cost or distance to the destination). Routing protocols update these tables dynamically to ensure efficient data transmission.

An analogy for a routing table is a map with marked routes and distances. Just as a map helps a traveler find the best route, a routing table helps a router find the best path for data packets.

4. MAC Addresses

MAC (Media Access Control) addresses are unique identifiers assigned to network interfaces for communications at the data link layer. Each network device, such as a computer or a switch, has a unique MAC address. Switches use MAC addresses to forward data packets to the correct destination within the network.

Think of a MAC address as a unique serial number on a product. Just as the serial number identifies a specific product, a MAC address identifies a specific network device.

5. Network Topology

Network topology refers to the arrangement of various elements (links, nodes, etc.) in a computer network. Common topologies include star, bus, ring, and mesh. The choice of topology affects network performance, scalability, and fault tolerance. Routers and switches play a crucial role in maintaining and managing network topology.

An analogy for network topology is the layout of streets in a city. Just as different street layouts affect traffic flow, different network topologies affect data flow.