1. Implement, Optimize and Troubleshoot Core IP Technologies
1.1. Packet over SONET
1.1.01. Cisco HDLC encapsulation
1.1.02. PPP encapsulation
1.1.03. Frame Relay encapsulation
1.1.04. Maximum transmission unit (MTU)
1.1.05. Cyclic redundancy check (CRC)
1.1.06. Keepalive timer
1.1.07. Frame Relay DLCI on point to point sub-interface
1.1.08. SONET Controller
1.1.09. POS channel
1.1.10. Channelized SONET
1.1.11. SONET APS
1.2. IP over DWDM
1.2.1. Optical channel payload unit (OPU)
1.2.2. Optical channel data unit (ODU)
1.2.3. Optical channel transport unit (OTU)
1.2.4. Optical channel (OCh)
1.2.5. Shared Risk Link Group (SRLG)
1.2.6. Virtual Transponder (VTXP)
1.2.7. FEC-FRR Triggering
1.2.8. Optical Parameters- Rx-los-threshold, Wavelength and Transmit-power
1.2.9. G.709 Parameters
1.3. GE/10GE in the Core
1.3.1. Gigabit Ethernet standards
1.3.2. 10 Gigabit Ethernet standards
1.3.3. Duplex mode
1.3.4. MTU
1.3.5. Flow control
1.3.6. Link Aggregation Control Protocol (LACP)
1.3.7. 802.1Q VLAN sub-interface
1.4. SP high end product
1.4.01. IOS-XR structure
1.4.02. Install IOS-XR software
1.4.03. Upgrade and manage IOS-XR software
1.4.04. Secure domain router (SDR)
1.4.05. CRS-1/3 structure
1.4.06. CRS-1/3 Multi chassis
1.4.07. Redundant Route Processors
1.4.08. RP switchover
1.4.09. MSC Architecture
1.4.10. Switch Fabric Architecture
1.5. IGP routing
1.5.01. Network Service Access Point (NSAP)
1.5.02. IS-IS Packet data unit (PDU)
1.5.03. IS-IS hello
1.5.04. IS-IS Link-state packets
1.5.05. IS-IS Sequence Number Packets
1.5.06. IS-IS area type
1.5.07. IS-IS level
1.5.08. IS-IS circuit type
1.5.09. IS-IS Type Length Values (TLV)
1.5.10. IS-IS Pseudo node
1.5.11. IS-IS Designated Intermediate Systems
1.5.12. IS-IS SPF
1.5.13. IS-IS LSP attached bit
1.5.14. IS-IS LSP overload bit
1.5.15. IS-IS Multi topology
1.5.16. IS-IS Metric
1.5.17. IS-IS support for IPv6
1.5.18. OSPF multi instance
1.5.19. OSPF router-ID
1.5.20. OSPF router type
1.5.21. OSPF area
1.5.22. OSPF hello
1.5.23. OSPF LSA
1.5.24. OSPF media type
1.5.25. OSPF Designated Routers
1.5.26. OSPF interface cost
1.5.27. OSPF interface type
1.5.28. OSPFv3 support for IPv6
1.5.29. EIGRP Diffusing Update Algorithm (DUAL)
1.5.30. EIGRP Composite Metrics
1.5.31. EIGRP Hello
1.5.32. EIGRP neighbor
1.5.33. EIGRP Unequal Cost Load Sharing
1.5.34. RIP v2
1.3.35. RIP support for IPv6
1.5.36. Redistribution between OSPF,IS-IS and EIGRP
1.5.37. Redistribution of Directly connected routes
1.5.38. Redistribution of Static routes
1.5.39. Route summary
1.5.40. IOS-XR routing policy language (RPL)
1.5.41. Routing policy using route-map
1.6. MPLS and LDP
1.6.01. MPLS network component (P, PE, CE)
1.6.02. MPLS label format
1.6.03. MPLS label encapsulation
1.6.04. MPLS label stack
1.6.05. MPLS label operation
1.6.06. Forwarding Equivalence Class
1.6.07. Label Distribution Protocol (LDP)
1.6.08. Label advisement model
1.6.09. MPLS LDP—Local Label Allocation Filtering
1.6.10. MPLS LDP-IGP synchronization
1.6.11. MPLS LDP Inbound/outbound Label Binding Filtering
1.6.12. Label Merging
1.6.13. MPLS over ATM
1.6.14. P2MP MPLS
1.6.15. Multicast LDP(mLDP)
1.7. MPLS Traffic Engineering
1.7.01. TE Path calculation Constrained-Based Shortest Path First (CSPF)
1.7.02. TE link information distribution
1.7.03. RSVP support for TE path setup
1.7.04. IS-IS support for TE
1.7.05. OSPF support for TE
1.7.06. Forwarding Traffic down Tunnel
1.7.07. MPLS-TE Automatic Bandwidth
1.7.08. MPLS-TE Static route
1.7.09. MPLS-TE Auto route
1.7.10. MPLS-TE Policy route
1.7.11. MPLS-TE Forwarding adjacency
1.7.12. MPLS-TE path metric
1.7.13. MPLS-TE LSP attributes
1.7.14. MPLS-TE Class-based Tunnel selection
1.7.15. Pseudowire Tunnel Selection
1.7.16. Point to multi point ( P2MP) MPLS TE
1.7.17. Shared Risk Link Group (SRLG)
1.7.18. Inter-Domain MPLS TE
1.7.19. Inter-Area MPLS TE
1.8. BGP
1.8.01. BGP messages
1.8.02. BGP neighbor
1.8.03. BGP update
1.8.04. BGP attributes
1.8.05. BGP synchronization
1.8.06. BGP routes aggregation
1.8.07. BGP route reflector
1.8.08. BGP confederation
1.8.09. BGP Communites
1.8.10. BGP Cluster list
1.8.11. BGP Peer Groups
1.8.12. IBGP IPv4/IPv6 Peering
1.8.13. EBGP IPv4/IPv6 Peering
1.8.14. EBGP IPv4/IPv6 multi hop peering
1.8.15. BGP IPv4/IPv6 routes advertising
1.8.16. EBGP IPv4/IPv6 peering using local-AS
1.8.17. EBGP IPv4/IPv6 peering using AS-override
1.8.18. BGP IPv4/IPv6 using private AS number
1.8.19. Dual AS configuration for Network AS migration
1.8.20. BGP Routing policy
1.8.21. Redistributing IGP, static and connected route into BGP
1.8.22. BGP Multi-path Load Sharing
1.8.23. BGP Link Bandwidth
1.9. Multicast
1.9.01.1 IPv4/IPv6 Multicast addressing
1.9.01.2 Multicast distribution tree
1.9.01.3 Multicast forwarding
1.9.01.4 Multicast Reverse Path Forwarding (RPF)
1.9.01.5 Multicast Administrative Boundaries
1.9.01.6 PIM sparse mode for IPv4/IPv6
1.9.02. IPv4/IPv6 Multicast routing
1.9.03. PIM Sparse Mode for IPv4/IPv6
1.9.04. IGMP V2/V3
1.9.05. IPV6 Multicast Listener Discover (MLD)
1.9.06. PIM Source Specific Multicast (SSM) for IPv4/IPv6
1.9.07. Multicast Rate-limiting
1.9.08. PIM Bidirectional (BiDir)
1.9.09. PIM Static RP
1.9.10. PIM Bootstrap Router (BSR)
1.9.11. PIM Auto RP
1.9.12. PIM Anycast RP
1.9.13. Multicast Administrative Boundaries
1.9.14. MSDP
1.9.15. MP-BGP peer for Multicast
1.9.16. MP-BGP Multicast route advertising
1.9.17. Label switch multicast
1.10. High Availability
1.10.01. NSF/SSO for IGP routing
1.10.02. NSF/SSO for BGP routing
1.10.03. NSF/SSO for LDP, TE, Multicast
1.10.04. HSRP, VRRP, GLBP
1.10.05. Graceful Restart
1.10.06. Control Plane Policing (CPP)
1.10.07. Bidirectional forwarding detection (BFD)
1.10.08. IP event dampening
1.10.09. IGP Fast Re-route
1.10.10. MPLS TE Fast Re-route (FRR)
1.10.11. Link Protection using MPLS-TE
1.10.12. Node Production using MPLS-TE
1.10.13. Embedded event management (EEM)
1.10.13. Hold-off Timer to Prevent Fast Reroute from Being Triggered (SONET)
1.11. Convergence
1.11.01. IS-IS fast convergence
1.11.02. IS-IS to utilize the Overload Bit
1.11.03. OSPF fast convergence
1.11.04. BGP fast convergence
1.11.05. BGP Route Dampening
1.11.06. BGP Fast Peering Session Deactivation
1.11.07. BGP Prefix Independent Convergence (PIC)
1.11.08. BGP next hop tracking
1.11.09. BGP address tracking filter
1.11.10. BGP path MTU discovery
1.11.11. IP fast reroute (IPFRR)
1.11.12. Multicast-only Fast Re-Route (MoFRR)
1.11.13. MPLS LDP convergence
1.12. SP QoS
1.12.01. Marking using DSCP, IP precedence and CoS
1.12.02. Priority Queuing
1.12.03. Custom Queuing
1.12.04. Weighted Fair Queuing
1.12.05. WRED
1.12.06. Policing
1.12.07. Class-based Weighted Faire Queuing (CB-WFQ)
1.12.08. Low-Latency Queuing (LLQ)
1.12.09. Random-Detect using MQC
1.12.10. NBAR for QoS
1.12.11. MPLS EXP
1.12.12. Differentiated Services Traffic Engineering (DS-TE)
1.12.13. Maximum Allocation Model (MAM)
1.12.14. Russian Dolls Model (RDM)
1.12.15. Class-Based Tunnel Selection: CBTS
1.12.16. Policy-based Tunnel Selection: PBTS
1.13. Security in core
1.13.01. Standard Access-lists
1.13.02. Extended Access-lists
1.13.03. Routing Protocol Authentication for RIP V2
1.13.04. Routing Protocol Authentication for EIGRP
1.13.05. Routing Protocol Authentication for OSPF
1.13.06. Routing Protocol Authentication for IS-IS
1.13.07. Routing Protocol Authentication for BGP
1.13.08. BGP TTL Security Check
1.13.09. Infrastructure ACL
1.13.10. Anti Fragment Attacks
1.13.11. Filtering RFC 1918 Routes
1.13.12. uRPF for Anti-Spoofinng
1.13.13. Selective packet discard (SPD)
1.13.14. LDP authentication
1.13.15. Remote triggered black hole (RTBH)
1.13.16. NTP
1.13.17. Attack mitigation
1.13.18. SNMP Management
1.13.19. IP packet Accounting
1.13.20. Syslog
2. Implement, Optimize and Troubleshoot Edge/Access Technologies
2.1. FE/GE and Ethernet Trunk connections
2.1.01. Ethernet Wire Service (EWS)
2.1.02. Ethernet Relay Service (ERS)
2.1.03. Ethernet Multipoint Service (EMS)
2.1.04. Ethernet Flow Point (EFP)
2.1.05. Ethernet Virtual Circuit (EVC)
2.1.06. 802.1Q standard
2.1.07. 802.1QinQ
2.1.08. 802.1ad Provider Bridges (PB)
2.1.09. 802.1ah Provider Backbone Bridge (PBB)
2.1.10. Spanning Tree Protocol (STP)
2.1.11. Resilient Ethernet Protocol (REP)
2.1.12. Virtual Trunking Protocol (VTP)
2.1.13. Flexible Service Mapping/Forwarding
2.1.14. Ethernet Connectivity Fault Management (CFM)
2.1.15. Ethernet channel
2.2. PPP connections
2.2.1. LCP
2.2.2. NCP
2.2.3. PPP encapsulation
2.2.4. PPP multilink
2.2.5. PPP Multi chassis multilink
2.2.6. PPPoE client
2.2.7. PPPoE server
2.2.8. PPP authentication
2.3. SONET/SDH connections
2.3.1. SONET/SDH frame
2.3.2. Automatic protection switching (APS), Timing
2.3.3. Channelized SDH, channelized interface,
2.4. Frame-relay connections
2.4.1. Frame Relay PVC, SVC, DLCI
2.4.2. Congestion-Control Mechanisms, FECN, BECN
2.4.3. Discard Eligibility (DE) bit
2.4.4. Frame Relay Fragmentation (FRF.12)
2.4.5. Frame Relay FRF.9 Payload Compression
2.4.6. Frame Relay Multilink (MLFR-FRF.16)
2.4.7. Frame Relay Switching
2.4.8. Frame-Relay LMI-Type
2.4.9. PPP over Frame-Relay
2.5. ATM connections
2.5.1. ATM cell
2.5.2. Virtual Path Identifier (VPI), Virtual Channel Identifier (VCI)
2.5.3. Payload Type (PT), Cell Loss Priority (CLP)
2.5.4. ATM adaptation layer (AAL)
2.5.5. ATM addressing
2.5.6. ATM PVC/SVC
2.5.7. ATM Cell Loss Priority (CLP) Setting
2.5.8. IP over ATM ( RFC1483)
2.6. T1/T3 and E1/E3 services.
2.6.1. Multiplexing
2.6.2. Framing
2.6.3. Timing
2.6.4. Chanel group
3. Describe, Implement, Optimize and Troubleshoot Remote Access Technologies
3.1. IP over DSL to the customer
3.1.1. PPPoA
3.1.2. PPPoE over ATM
3.1.3. L2TP between LAC and LNS
3.1.4. RA (PPPoA,PPPoE over ATM) to VRF and MPLS VPN
3.1.5. PPP authentication (Radius, TACACS)
3.1.6. DHCP and options 82
3.2. IP over wire line to the customer
3.2.1. PPP
3.2.2. PPPoE
3.2.3. L2TP between LAC and LNS
3.2.4. PPPoE to VRF and MPLS VPN
3.2.5. PPP authentication (Radius, TACACS)
3.2.6. DHCP and options 82
3.2.7. Broadband network gateway (BNG)
3.3. IP over Cable to the customer
3.3.1. DOCSIS 3.0
3.3.2. PPPoE
3.3.3. L2TP between LAC and LNS
4. Implement, Optimize and Troubleshoot Layer 3 VPN
4.1. Intra AS L3 MPLS VPN
4.1.01. MP-IBGP VPNv4/VPNv6 peering
4.1.02. MP-IBGP peering using loopback interface
4.1.03. VPNv4/VPNv6 Route Reflector
4.1.04. VRF definition
4.1.05. Route Distinguisher
4.1.06. Route Target
4.1.07. Route Target import/export
4.1.08. Intra AS MPLS VPNV4/VPNV6 load balancing
4.1.09. SOO Community
4.1.10. PE-CE – RIP V2
4.1.11. PE-CE – IS-IS
4.1.12. PE-CE – OSPF
4.1.13. PE-CE – EBGP
4.1.14. PE-CE – Static Routes
4.1.15. Redistributing dynamic PE-CE routes into VPNv4/VPNv6
4.1.16. Redistributing static PE-CE routes into VPNv4/VPNv6
4.1.17. Redistributing VPN4/VPNv6 routes into PE-CE routing table
4.1.18. Intra-AS MPLS VPN multipath
4.1.19. Intra-AS MPLS VPN path selection
4.2. Inter AS L3 MPLS VPN
4.2.1. MP-EBGP VPNv4/VPNv6 peering using direct interface
4.2.2. MP-EBGP VPNv4/VPNv6 peer using multi-hop interface
4.2.3. MP-EBGP VPNv4/VPNv6 peer between RRs
4.2.4. VPNV4/VPNv6 next-hop unchanged
4.2.5. VPNV4/VPNv6 next-hop self
4.2.6. Multi VRF between ASPEs
4.2.7. Inter-AS MPLS VPNV4/VPNv6 multipath
4.2.8. Route target rewrite
4.2.9. Inter-AS MPLS VPN path selection
4.3. Carrier supporting carrier
4.3.1. MPLS LDP in customer carrier site
4.3.2. EBGPv4 + label between CSC-PE and CSC-CE
4.3.3. IGP + LDP between CSC-PE and CSC-CE
4.3.4. MPLS VPNv4 between customer carrier sites PEs
4.3.5. CSC VPN load balancing
4.3.6. VRF definition in customer carrier site
4.3.7. Customer carrier site PE-CE routing
4.4. VPN Extranet and internet access
4.4.1. MP-BGP VPNv4/VPNv6 Extra-Net
4.4.2. MP-BGP VPNv4/VPNv6 internet access
4.5. VRF service
4.5.1. Multiple VRF
4.5.2. Multiple VRF routing
4.5.3. VRF Selection based on Source IP Address
4.6. Multicast VPN
4.6.1. Default MDT
4.6.2. Data MDT
4.6.3. MP-BGP mdt peering
4.6.4. Multicast routing in VPN site
4.6.5. PM-SM in VPN site
4.6.6. RP in VPN site
4.6.7. Multicast VPN extranet
4.7. GRE L3 VPN
4.7.1. MPLS VPN—L3VPN over GRE
5. Implement, Optimize and Troubleshoot Layer 2 VPN
5.1. Atom
5.1.01. Psuedowire-class
5.1.02. EoMPLS –Ethernet over MPLS
5.1.03. FRoMPLS –Frame Relay over MPLS
5.1.04. HDLCoMPLS-HDLC over MPLS
5.1.05. PPPoMPLS-PPP over MPLS
5.1.06. AAL5oMPLS-ATM AAL5 over MPLS
5.1.07. L2TPv3
5.1.08. FR/PPP/HDLC/Ethernet interworking over MPLS
5.1.09. FR/PPP/HDLC/Ethernet interworking over L2TPv3
5.1.10. L2VPN local switching
5.2. VPLS and Carrier Ethernet
5.2.1. VPLS
5.2.2. H-VPLS
5.2.3. VFI definition
5.2.4. VPLS BGP auto discovery
5.2.5. VLAN attached circuit
5.2.6. QinQ attached circuit
5.2.7. 802.1ad attached circuit
5.2.8. 802.1ah attached circuit
5.2.9. VPLS/H-VPLS redundancy
5.3. L2TPV3 for L2VPN
5.3.1. L2TPv3
5.3.2. L2TPv3 VPN local switching
5.3.3. L2TPv3 VPN interworking
5.4. GRE L2VPN
5.4.1. L2VPN over GRE
6. Implement, Optimize and Troubleshoot Managed Services Traversing the Core
6.1. Managed Voice/Video services traversing the core
6.1.1. Traverse Voice/video packet
6.1.2. Traverse call signal packet
6.2. Managed Security services traversing the core
6.2.1. Traverse IKE packet
6.2.2. Traverse ESP, AH packet
6.2.3. Traverse SSL packet
6.3. Service Level Agreements for managed services
6.3.1. IP SLA sender
6.3.2. IP SLA responder
6.3.3. IP SLA for MPLS VPN
6.3.4. Netflow
6.3.5. Netflow for MPLS
6.3.6. Netflow for Multicast
7. Describe Service Provider Network implementing principle
7.1 Given a Service Provider network design change or new service, identify the success criteria
7.2 Given a Service Provider network design change or new service, identify appropriate routing protocol
7.3 Given a Service Provider network design change or new service, identify appropriate tunneling protocol
7.4 Given a Service Provider network design change or new service, identify improving convergence method
7.5 Given a Service Provider network design change or new service, identify improving stability method
7.6 Given a Service Provider network design change or new service, identify improving reliability method
7.7 Given a Service Provider network design change or new service, identify improving management method
7.8 Given a Service Provider network design change or new service, identify improving QOS method
7.9 Given a Service Provider network design change or new service, identify improving security
【编辑推荐】