Cisco Certified Design Professional (CCDP) - Enterprise
1 Enterprise Architecture and Design Principles
1-1 Enterprise Network Design Concepts
1-1 1 Network Design Life Cycle
1-1 2 Design Considerations for Enterprise Networks
1-1 3 Network Segmentation and Micro-Segmentation
1-1 4 Network Security Design Principles
1-1 5 Network Scalability and Performance
1-1 6 Network Resilience and Redundancy
1-1 7 Network Automation and Programmability
1-1 8 Network Virtualization and SDN
1-1 9 Network Management and Monitoring
1-1 10 Compliance and Regulatory Requirements
1-2 Enterprise Network Design Models
1-2 1 Hierarchical Network Design Model
1-2 2 Spine-Leaf Architecture
1-2 3 Modular Network Design
1-2 4 Centralized vs Distributed Network Design
1-2 5 Hybrid Network Design Models
1-3 Enterprise Network Design Tools and Methodologies
1-3 1 Network Design Documentation
1-3 2 Network Design Software Tools
1-3 3 Network Design Methodologies (e g , TOGAF, Zachman)
1-3 4 Network Design Best Practices
2 Enterprise Network Infrastructure Design
2-1 Campus Network Design
2-1 1 Campus Network Topologies
2-1 2 Campus Network Access Layer Design
2-1 3 Campus Network Distribution Layer Design
2-1 4 Campus Network Core Layer Design
2-1 5 Campus Network Wireless Design
2-1 6 Campus Network Security Design
2-1 7 Campus Network Management and Monitoring
2-2 Data Center Network Design
2-2 1 Data Center Network Topologies
2-2 2 Data Center Network Fabric Design
2-2 3 Data Center Network Redundancy and Resilience
2-2 4 Data Center Network Security Design
2-2 5 Data Center Network Virtualization
2-2 6 Data Center Network Automation
2-2 7 Data Center Network Management and Monitoring
2-3 WAN Design
2-3 1 WAN Topologies
2-3 2 WAN Connectivity Options (e g , MPLS, VPN, Internet)
2-3 3 WAN Optimization Techniques
2-3 4 WAN Security Design
2-3 5 WAN Management and Monitoring
2-4 Cloud and Hybrid Network Design
2-4 1 Cloud Network Design Principles
2-4 2 Hybrid Network Design
2-4 3 Cloud Connectivity Options
2-4 4 Cloud Network Security Design
2-4 5 Cloud Network Management and Monitoring
3 Enterprise Network Services Design
3-1 IP Addressing and Subnetting
3-1 1 IPv4 and IPv6 Addressing
3-1 2 Subnetting Techniques
3-1 3 IP Address Management (IPAM)
3-1 4 Addressing for Network Virtualization
3-2 Routing Protocols and Design
3-2 1 Interior Gateway Protocols (e g , OSPF, EIGRP)
3-2 2 Exterior Gateway Protocols (e g , BGP)
3-2 3 Routing Policy Design
3-2 4 Route Redistribution and Filtering
3-2 5 Routing for Network Virtualization
3-3 Switching and VLAN Design
3-3 1 Layer 2 Switching Protocols (e g , STP, VTP)
3-3 2 VLAN Design and Implementation
3-3 3 Trunking and Inter-VLAN Routing
3-3 4 Virtual Switching (e g , VSS, VPC)
3-3 5 Switching for Network Virtualization
3-4 Network Security Services Design
3-4 1 Firewall Design and Implementation
3-4 2 Intrusion Detection and Prevention Systems (IDSIPS)
3-4 3 Network Access Control (NAC)
3-4 4 VPN Design and Implementation
3-4 5 Secure Network Design Best Practices
3-5 Network Management and Monitoring Services Design
3-5 1 Network Management Protocols (e g , SNMP, NetFlow)
3-5 2 Network Monitoring Tools and Techniques
3-5 3 Network Performance Optimization
3-5 4 Network Troubleshooting and Diagnostics
3-5 5 Network Management for Virtualized Environments
4 Enterprise Network Implementation and Optimization
4-1 Network Implementation Planning
4-1 1 Implementation Project Management
4-1 2 Implementation Documentation
4-1 3 Implementation Best Practices
4-1 4 Implementation Testing and Validation
4-2 Network Optimization Techniques
4-2 1 Network Performance Tuning
4-2 2 Network Traffic Analysis and Optimization
4-2 3 Network Latency Reduction Techniques
4-2 4 Network Optimization for Virtualized Environments
4-3 Network Troubleshooting and Diagnostics
4-3 1 Troubleshooting Methodologies
4-3 2 Common Network Issues and Solutions
4-3 3 Network Diagnostics Tools and Techniques
4-3 4 Troubleshooting for Virtualized Networks
4-4 Network Compliance and Audit
4-4 1 Network Compliance Requirements
4-4 2 Network Audit Procedures
4-4 3 Network Compliance Best Practices
4-4 4 Network Compliance for Virtualized Environments
5 Enterprise Network Design Case Studies
5-1 Campus Network Design Case Study
5-1 1 Case Study Overview
5-1 2 Design Considerations
5-1 3 Implementation and Optimization
5-1 4 Lessons Learned
5-2 Data Center Network Design Case Study
5-2 1 Case Study Overview
5-2 2 Design Considerations
5-2 3 Implementation and Optimization
5-2 4 Lessons Learned
5-3 WAN Design Case Study
5-3 1 Case Study Overview
5-3 2 Design Considerations
5-3 3 Implementation and Optimization
5-3 4 Lessons Learned
5-4 Cloud and Hybrid Network Design Case Study
5-4 1 Case Study Overview
5-4 2 Design Considerations
5-4 3 Implementation and Optimization
5-4 4 Lessons Learned
2-3-1 WAN Topologies

2-3-1 WAN Topologies

Key Concepts

Point-to-Point Topology

The Point-to-Point Topology is the simplest form of WAN topology, consisting of a direct connection between two endpoints. This topology is commonly used for connecting remote offices or data centers to a central headquarters. It provides a dedicated link with guaranteed bandwidth and low latency.

Example: A company might use a Point-to-Point connection to link its main office in New York with a remote branch in Los Angeles. This ensures a secure and reliable connection for data transfer and communication.

Hub-and-Spoke Topology

The Hub-and-Spoke Topology is a centralized network design where a central hub (or main office) connects to multiple spokes (or remote sites) through dedicated links. This topology is cost-effective and easy to manage, as it centralizes network control and reduces the number of required connections.

Example: A multinational corporation might use a Hub-and-Spoke topology to connect its regional offices in Europe, Asia, and the Americas to a central data center in the United States. This allows for centralized management and efficient data distribution.

Mesh Topology

The Mesh Topology involves multiple interconnected nodes, where each node has a direct connection to every other node. This topology provides high redundancy and reliability, as there are multiple paths for data to travel. However, it is more complex and expensive to implement due to the large number of connections required.

Example: A financial services company might use a Mesh Topology to connect its critical data centers across different cities. This ensures that if one connection fails, data can still be routed through alternative paths, maintaining high availability and reliability.

Hybrid Topology

The Hybrid Topology combines elements of different WAN topologies to create a customized solution that meets specific requirements. It can include features from Point-to-Point, Hub-and-Spoke, and Mesh topologies, among others. This flexibility allows organizations to optimize their WAN design for performance, cost, and redundancy.

Example: A large enterprise might use a Hybrid Topology that includes Point-to-Point connections for critical links, a Hub-and-Spoke design for regional offices, and a Mesh network for high-availability data centers. This ensures that the WAN meets the diverse needs of the organization.

Examples and Analogies

Think of the Point-to-Point Topology as a direct flight between two cities, providing a dedicated and efficient route for travel.

The Hub-and-Spoke Topology can be compared to a star-shaped transportation system, where a central hub connects to multiple outlying areas. This ensures that all traffic passes through the central hub, simplifying management and control.

The Mesh Topology is like a complex web of roads connecting every city, ensuring that there are multiple routes to reach any destination. This provides high redundancy and reliability, but requires more infrastructure and maintenance.

The Hybrid Topology is akin to a custom-built transportation system that combines elements of direct flights, star-shaped networks, and complex road systems to meet specific needs. This ensures that the transportation network is efficient, reliable, and cost-effective.

By understanding these WAN Topologies, network professionals can design efficient, reliable, and cost-effective Wide Area Networks that meet the needs of modern enterprises.