Welcome to the implementing cisco enterprise network, Core technologies course otherwise, Known as cisco encore. The exam goes by the designation 350-401. This is a very important exam in the cisco portfolio of exams. This exam allows you to meet the core requirement for your ccnp enterprise certification from cisco systems, But this exam also qualifies you to take the ccie enterprise infrastructure exam. So this acts as your written exam qualification for the practical lab exam for ccie.

That is one of the reasons this particular course, And this exam is so popular from cisco systems. What we'll do in this course is we'll explore not one not two but six different domain areas, We'll look at the overall architecture and the architectural components that we find in a large enterprise network. Today we'll examine virtualization technologies. We can expect to encounter we'll look at infrastructure components like our popular routing protocols, We'll discuss network assurance, How you can make sure that the network is running the way you need it to run at all times, We'll discuss security, Which, Of course, Is very important in Today's enterprise and finally we'll round it out with a discussion of automation, Automation and programmability, Is pervasive now in networking and we'll see the tools and techniques that you can use in a cisco enterprise network environment in order to really really succeed with both automation and orchestration. That'll help you minimize the costs and the overall amount of time and configuration errors that you might run into if you're, Not taking advantage of things like automation and orchestration so get ready. This is going to be a very exciting course indeed covering some of the latest.

Greatest cisco technologies so welcome to the first official domain of encore and what we're going to be looking at first is the overall architectural design approaches that are so popular in networks. Today, It used to be that we were dealing almost exclusively with classic, As we now call them hierarchical models that were either three tiers or two tiers. So we'll take a look at that we'll also be looking at technologies like redundancy and high availability and technologies like stateful switchover, Which are important in the architecture to make sure that the network and the network components is always available. We'll talk about wireless lan deployments and how we can position the important wireless lan controllers to make sure that the wireless lan is as robust and as effective for us as possible. We'll take a look at on-premise verse cloud deployments, A topic that didn't even exist. 20 years ago, In such a discussion, But now we know it's critical and we'll explain the working principles of the sd-wan solution from cisco systems.

This is a very exciting software-defined way in which to automate and orchestrate and monitor and optimize the wide area network. We'll talk about the sd access solution from cisco systems, Where we're going to add orchestration and automation to the access layer of a large enterprise, We'll also discuss the concepts of wired and wireless qos quality of service is a very important ingredient in networks today. So we'll be analyzing that in great detail and finally, We'll be talking about the different hardware mechanisms that we can utilize inside a switched infrastructure to give us incredible performance, Both a switched and a routed infrastructure. The main star of the show there is going to be.

None other than cisco express forwarding and will teach you just how cisco express forwarding can really optimize the performance of your cisco network devices, So a very important module centered around architectural designs that we find today in the modern enterprise. So, For the longest time when we discussed architectural models inside of cisco built architectures, We were always really deciding between two main approaches. We now call them the classic models because we have evolved and there are more models that we could use today, But these classic models were referred to as the three-tier and the two-tier classic models. T actually have other names that I'll be sharing with you as well, But we'll go ahead and just refer to them as the classic three-tier and two-tier models. So the three-tier model consists of an access layer which is closest to your end users. It's how t're accessing your network and then there is a distribution layer which is typically filled with multi-layer switches, And these devices have the ability to route.

CCNP 300-730 Questions

So t can route your users to different parts of the network or even the internet, And your wan connections out to branch offices and then a high speed core layer that is often made up of. As we'll see very high speed, Core switches. Each layer has its specific functions: each layer has its specific technologies and each layer has its specific devices that you would typically find. In fact, This model was so popular that cisco would often describe their components that way, So t would say things like here are a bunch of access layer. Switches that we have available here are a bunch of distribution layer.

Multi-Layer switches that we have available here are core switches we have available, So the popular popularity of the model literally impacted how cisco would market their equipment. Now it's important to realize that this model, As I alluded to, Does go by different names. So you might hear folks call this the hierarchical model you might hear the core layer referred to as the backbone you might hear. The distribution layer referred to as the aggregation layer, The access layer might be called the workstation layer, But you will notice that it's three tiers and the reason why we love to break up the network into tiers of operation and we love to conceptually modularize the network.

Like this, And even modularize it when we are building it is, It makes it easier to understand it, Makes it easier to work with it, Makes it easier for you to design and implement. Whenever we're dealing with something really complex, We will break it down, Often into stages or modules, To simplify things and that's exactly the approach that is done with a hierarchical model like this. So, Let's zero in on the access layer, As you can see, It's often built with these layer, Two switches, The layer, Two switches: don't necessarily have routing capabilities, So t're just going to be doing the high speed access layer work that we would expect to find t'll. Be running technologies like spanning tree protocol because t're want you are going to want to use redundant connections all over the place in the access layer between these devices, And these redundant connections, Of course, Could cause switching loops. So we want to be very careful about that, And spanning tree protocol can run behind the scenes here and protect against loops, So we often see spanning tree protocol in the access layer of the model.

Also, Today, We have a lot of devices like like ip cameras and ip phones and wireless access points that are going to need power, Good old-fashioned, Ac power from a wall outlet and to facilitate this, Especially as we are positioning these devices in interesting locations all around Our enterprise, Like maybe access points, Are positioned in the ceiling. We would love to be able to give them power in a very simple way, And that is accomplished at the access layer with power over ethernet when we plug in this device using the ethernet cable into one of our switches of the access layer. It can give that device the power that it needs. So it's remarkable. The ethernet cable is not only connecting the device into the network from an ip perspective, But that same ethernet cable is giving the device the power it needs to operate.

Another technology that we see at the access layer is the voice vlans when we plug a cisco ip phone into the access layer that phone's phone traffic, The voice traffic that that phone is specialized to carry is going to be placed dynamically into its own vlan. So this is great: we segment the voice traffic in its own virtual local area network. One of the reasons we like to do this is, I suppose, Security. But the main reason is we love to segment the voice traffic into its own vlan, So that we can more easily treat this voice traffic with the quality of service and the special attention that it needs and deserves on the network.

Another thing that we have is certain qos functions at the access layer, Things like marking traffic, Classifying traffic, Maybe even rate limiting traffic can be done at the access layer, And this is wonderful. These qos mechanisms can help ensure that our traffic that needs special attention can get it, Something that we like to do at the access layer from a security perspective is port security, Where we are going to lock down access to those switch ports. Utilizing a mac address, For example, And finally, There's vlan access control lists for security that you can find at the access layer. These are going to allow you to control within a vlan who can communicate in that vlan with what other devices so with routed access control lists.

Clearing the Certification isn’t considered to be that much easy, you have to go through rigorous training and lots of CCNP 300-730 Questions would be needed to go through unless you have some expertise training courses like such offered at the EveDumps.

Comments

Leave a comment