Cisco Certified Design Professional (CCDP) - Enterprise
1 Enterprise Architecture and Design Principles
1-1 Enterprise Network Design Concepts
1-1 1 Network Design Life Cycle
1-1 2 Design Considerations for Enterprise Networks
1-1 3 Network Segmentation and Micro-Segmentation
1-1 4 Network Security Design Principles
1-1 5 Network Scalability and Performance
1-1 6 Network Resilience and Redundancy
1-1 7 Network Automation and Programmability
1-1 8 Network Virtualization and SDN
1-1 9 Network Management and Monitoring
1-1 10 Compliance and Regulatory Requirements
1-2 Enterprise Network Design Models
1-2 1 Hierarchical Network Design Model
1-2 2 Spine-Leaf Architecture
1-2 3 Modular Network Design
1-2 4 Centralized vs Distributed Network Design
1-2 5 Hybrid Network Design Models
1-3 Enterprise Network Design Tools and Methodologies
1-3 1 Network Design Documentation
1-3 2 Network Design Software Tools
1-3 3 Network Design Methodologies (e g , TOGAF, Zachman)
1-3 4 Network Design Best Practices
2 Enterprise Network Infrastructure Design
2-1 Campus Network Design
2-1 1 Campus Network Topologies
2-1 2 Campus Network Access Layer Design
2-1 3 Campus Network Distribution Layer Design
2-1 4 Campus Network Core Layer Design
2-1 5 Campus Network Wireless Design
2-1 6 Campus Network Security Design
2-1 7 Campus Network Management and Monitoring
2-2 Data Center Network Design
2-2 1 Data Center Network Topologies
2-2 2 Data Center Network Fabric Design
2-2 3 Data Center Network Redundancy and Resilience
2-2 4 Data Center Network Security Design
2-2 5 Data Center Network Virtualization
2-2 6 Data Center Network Automation
2-2 7 Data Center Network Management and Monitoring
2-3 WAN Design
2-3 1 WAN Topologies
2-3 2 WAN Connectivity Options (e g , MPLS, VPN, Internet)
2-3 3 WAN Optimization Techniques
2-3 4 WAN Security Design
2-3 5 WAN Management and Monitoring
2-4 Cloud and Hybrid Network Design
2-4 1 Cloud Network Design Principles
2-4 2 Hybrid Network Design
2-4 3 Cloud Connectivity Options
2-4 4 Cloud Network Security Design
2-4 5 Cloud Network Management and Monitoring
3 Enterprise Network Services Design
3-1 IP Addressing and Subnetting
3-1 1 IPv4 and IPv6 Addressing
3-1 2 Subnetting Techniques
3-1 3 IP Address Management (IPAM)
3-1 4 Addressing for Network Virtualization
3-2 Routing Protocols and Design
3-2 1 Interior Gateway Protocols (e g , OSPF, EIGRP)
3-2 2 Exterior Gateway Protocols (e g , BGP)
3-2 3 Routing Policy Design
3-2 4 Route Redistribution and Filtering
3-2 5 Routing for Network Virtualization
3-3 Switching and VLAN Design
3-3 1 Layer 2 Switching Protocols (e g , STP, VTP)
3-3 2 VLAN Design and Implementation
3-3 3 Trunking and Inter-VLAN Routing
3-3 4 Virtual Switching (e g , VSS, VPC)
3-3 5 Switching for Network Virtualization
3-4 Network Security Services Design
3-4 1 Firewall Design and Implementation
3-4 2 Intrusion Detection and Prevention Systems (IDSIPS)
3-4 3 Network Access Control (NAC)
3-4 4 VPN Design and Implementation
3-4 5 Secure Network Design Best Practices
3-5 Network Management and Monitoring Services Design
3-5 1 Network Management Protocols (e g , SNMP, NetFlow)
3-5 2 Network Monitoring Tools and Techniques
3-5 3 Network Performance Optimization
3-5 4 Network Troubleshooting and Diagnostics
3-5 5 Network Management for Virtualized Environments
4 Enterprise Network Implementation and Optimization
4-1 Network Implementation Planning
4-1 1 Implementation Project Management
4-1 2 Implementation Documentation
4-1 3 Implementation Best Practices
4-1 4 Implementation Testing and Validation
4-2 Network Optimization Techniques
4-2 1 Network Performance Tuning
4-2 2 Network Traffic Analysis and Optimization
4-2 3 Network Latency Reduction Techniques
4-2 4 Network Optimization for Virtualized Environments
4-3 Network Troubleshooting and Diagnostics
4-3 1 Troubleshooting Methodologies
4-3 2 Common Network Issues and Solutions
4-3 3 Network Diagnostics Tools and Techniques
4-3 4 Troubleshooting for Virtualized Networks
4-4 Network Compliance and Audit
4-4 1 Network Compliance Requirements
4-4 2 Network Audit Procedures
4-4 3 Network Compliance Best Practices
4-4 4 Network Compliance for Virtualized Environments
5 Enterprise Network Design Case Studies
5-1 Campus Network Design Case Study
5-1 1 Case Study Overview
5-1 2 Design Considerations
5-1 3 Implementation and Optimization
5-1 4 Lessons Learned
5-2 Data Center Network Design Case Study
5-2 1 Case Study Overview
5-2 2 Design Considerations
5-2 3 Implementation and Optimization
5-2 4 Lessons Learned
5-3 WAN Design Case Study
5-3 1 Case Study Overview
5-3 2 Design Considerations
5-3 3 Implementation and Optimization
5-3 4 Lessons Learned
5-4 Cloud and Hybrid Network Design Case Study
5-4 1 Case Study Overview
5-4 2 Design Considerations
5-4 3 Implementation and Optimization
5-4 4 Lessons Learned
2-3-3 WAN Optimization Techniques

2-3-3 WAN Optimization Techniques

Key Concepts

Data Compression

Data Compression is a technique used to reduce the size of data before it is transmitted over a WAN. This reduces the amount of bandwidth required, thereby improving transmission speed and efficiency. Common compression methods include lossless compression, which preserves all data, and lossy compression, which sacrifices some data for greater efficiency.

Example: A large file transfer over a WAN can be compressed using a lossless algorithm like ZIP before transmission. This reduces the file size, allowing it to be transferred faster and using less bandwidth.

Caching

Caching involves storing frequently accessed data closer to the user to reduce latency and improve response times. By keeping copies of data at various points in the network, caching minimizes the need to retrieve data from the original source, thereby optimizing WAN performance.

Example: A web browser cache stores frequently visited web pages locally. When a user revisits a page, the browser retrieves it from the cache instead of the remote server, reducing load times and WAN traffic.

Quality of Service (QoS)

Quality of Service (QoS) is a set of techniques used to manage network traffic and ensure that critical applications receive priority over less important ones. QoS policies can prioritize traffic based on factors like bandwidth, latency, and jitter, ensuring that high-priority applications like VoIP and video conferencing receive the necessary resources.

Example: In a corporate WAN, QoS policies can be configured to prioritize VoIP traffic over file transfers. This ensures that voice calls remain clear and uninterrupted, even during periods of high network congestion.

Multiprotocol Label Switching (MPLS)

Multiprotocol Label Switching (MPLS) is a data-carrying mechanism that uses short path labels instead of long network addresses to route packets. MPLS allows for faster and more efficient routing, as it bypasses the need for complex lookups in the routing table, thereby optimizing WAN performance.

Example: A financial institution might use MPLS to route trading data between its data centers. The use of labels allows for rapid packet forwarding, ensuring that trading orders are processed quickly and efficiently.

Application Acceleration

Application Acceleration techniques are designed to improve the performance of specific applications over a WAN. This can include methods like protocol optimization, which reduces the overhead of application protocols, and data prefetching, which anticipates data needs and retrieves them in advance.

Example: A remote office using a centralized CRM system can benefit from application acceleration. Techniques like protocol optimization can reduce the latency of CRM interactions, making the application feel faster and more responsive.

Examples and Analogies

Think of Data Compression as packing a suitcase efficiently to reduce the amount of space it takes up, allowing more items to be transported in the same amount of space. Caching is like having a local library that keeps copies of popular books, so you don't have to travel far to get them.

Quality of Service (QoS) is like a traffic management system that ensures emergency vehicles always have priority on the road, even during rush hour. Multiprotocol Label Switching (MPLS) is akin to a high-speed train that bypasses crowded highways, reaching its destination faster.

Application Acceleration is like optimizing a car's engine to make it more fuel-efficient and faster, ensuring that it performs better on long journeys.

By understanding these WAN Optimization Techniques, network professionals can design and manage efficient, high-performance WANs that meet the needs of modern enterprises.