Here, Here, excellent advice. Everybody's looking for the easy answer and once again Chuck brings it back home. Everything you need is on the CCO, if you just work at getting it out. In addition, you learn a lot more from the discovery process. Best advice I've heard all day... --- Dennis -----Original Message----- From: Chuck Larrieu [mailto:[EMAIL PROTECTED]] Sent: Thursday, June 28, 2001 4:14 PM To: [EMAIL PROTECTED] Subject: RE: CCIE written blueprints. Lets pass this blueprint around [7:10350] first skill any CCIE candidate needs - how to look on CCO for the information you need. It's all there. The blueprint is publicly available. so go read it, study, and take the test. Chuck -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of hal9001 Sent: Thursday, June 28, 2001 3:02 PM To: [EMAIL PROTECTED] Subject: Re: CCIE written blueprints. Lets pass this blueprint around [7:10336] Of course not its a Blue Print not a state secret so can I have a copy please! Karl HUTCHINSON ----- Original Message ----- From: "Michael L. Williams" To: Sent: Thursday, June 28, 2001 10:40 PM Subject: Re: CCIE written blueprints. Lets pass this blueprint around [7:10332] > I would agree....... e-mail me the blueprint and I'll see which parts I can > fill in =) > > Mike W. > > wrote in message > [EMAIL PROTECTED]">news:[EMAIL PROTECTED]... > > I am just wound a little bit tight right now. This test has me really > > stressed out. There is so much stuff on this test it is overwhelming. > > I have studied and studied and studied some more and I am still not ready. > I > > don't want to waste $300. > > > > > > ----- Original Message ----- > > From: "Allen May" > > To: ; > > Sent: Thursday, June 28, 2001 2:40 PM > > Subject: Re: CCIE written blueprints. Lets pass this blueprint around tell > > [7:10310] > > > > > > > I'm just kidding dude... ;) Sorry... ;) > > > > > > > > > ----- Original Message ----- > > > From: > > > To: "Allen May" ; > > > Sent: Thursday, June 28, 2001 3:40 PM > > > Subject: Re: CCIE written blueprints. Lets pass this blueprint around > tell > > > [7:10310] > > > > > > > > > > Why? I am not doing anything wrong. I am just answering the blueprint > > > > objective! If I was divulging Cisco exam info that would be a NDA > > > violation. > > > > If I am wrong I apologize. > > > > > > > > Can I get some ffed back from the group? Is it wrong? > > > > > > > > > > > > ----- Original Message ----- > > > > From: "Allen May" > > > > To: ; > > > > Sent: Thursday, June 28, 2001 2:14 PM > > > > Subject: Re: CCIE written blueprints. Lets pass this blueprint around > > tell > > > > [7:10310] > > > > > > > > > > > > > Prepare to be blasted for NDA violations ;) > > > > > > > > > > ----- Original Message ----- > > > > > From: > > > > > To: > > > > > Sent: Thursday, June 28, 2001 3:05 PM > > > > > Subject: CCIE written blueprints. Lets pass this blueprint around > tell > > > > > [7:10310] > > > > > > > > > > > > > > > > I was studying the Blueprints for the 350-001 CCIE written test > and > > a > > > = > > > > > > thought popped into my head. If everyone who was trying to pass > this > > = > > > > > > exam would pull together and answer the Blueprint objectives it > > would > > > = > > > > > > really benefit everyone.=20 > > > > > > > > > > > > I have answered a couple of the objectives. Lets pass this > blueprint > > = > > > > > > around tell we get all of the objectives answered. > > > > > > > > > > > > =20 > > > > > > 1.. Cisco Device Operation=20 > > > > > > 1.. Commands: show, debug Infrastructure: NVRAM, Flash, Memory > & > > = > > > > > > CPU, file system, config reg > > > > > > 2.. Operations: file transfers, password recovery,=20 > > > > > > 3.. Simple Network Management Protocol (SNMP), accessing > > devices, > > > = > > > > > > security (passwords)=20 > > > > > > > > > > > > 1.. General Networking Theory=20 > > > > > > 1.. OSI model: Layer comparisons, functions > > > > > > 2.. General Routing Concepts: Split horizon, difference > between > > = > > > > > > switching and routing, summarization, Link State vs. Distance > > Vector, > > > = > > > > > > loops, tunneling > > > > > > 3.. Protocol comparisons: Internet Protocol (IP) vs. > > Internetwork > > > = > > > > > > Packet Exchange (IPX), Transmission Control Protocol (TCP), User = > > > > > > Datagram Protocol (UDP), etc. > > > > > > 4.. Standards: 802.x, protocol limitations > > > > > > 5.. Protocol Mechanics: Windowing/Acknowledgements (ACK), = > > > > > > fragmentation, maximum transmission unit (MTU), handshaking, > > > termination > > > > > > > > > > > > 1.. Bridging & LAN Switching=20 > > > > > > 1.. Transparent Bridging: IEEE/DEC spanning tree, > translational, > > = > > > > > > Configuration Bridging Protocol Data Unit (BPDU), Integrated > Routed > > > and > > > > = > > > > > > Bridging (IRB), Concurrent Routing and Bridging (CRB), access > lists > > > > > > 2.. Source Route Bridging: Source-route translational bridging > = > > > > > > (SR/TLB), source-route transparent bridging (SRT), data-link > > switching > > > = > > > > > > (DLSw), remote source-route bridging (RSRB), access lists > > > > > > 3.. LAN Switching: Trunking, VLAN Trunk Protocol (VTP), > > > inter-switch > > > > = > > > > > > link (ISL), Virtual LANs (VLANS), > > > > > > 4.. Fast Ether Channel (FEC) = > > > > > > > > > > > > http://www.cisco.com/warp/public/cc/techno/media/lan/ether/channel/tech/f= > > > > > > etec_wp.htm > > > > > > 5.. Cisco Discovery Protocol (CDP) > > > > > > 6.. Cisco Group Management Protocol (CGMP) When the > CGMP-capable > > = > > > > > > router receives an IGMP control packet, it creates a CGMP packet > > that > > > = > > > > > > contains the request type (either join or leave), the multicast > > group > > > = > > > > > > address, and the Media Access Control (MAC) address of the host. > The > > = > > > > > > router sends the CGMP packet to a well-known address to which all > = > > > > > > Catalyst 5000 series switches listen. When a switch receives the > > CGMP > > > = > > > > > > packet, the supervisor engine module interprets the packet and > > > modifies > > > > = > > > > > > the forwarding table automatically CGMP requires Catalyst 5000 > > series > > > = > > > > > > software release 2.2 or later and a network connection from the = > > > > > > Catalyst 5000 series switch to a router running CGMP. By default, > > > CGMP > > > > = > > > > > > is disabled, and no multicast routers are configured. Before you > > > enable > > > > = > > > > > > CGMP on a Catalyst 5000 series switch, you must disable IGMP > > snooping > > > = > > > > > > if it is enabled, by entering the set igmp disable command. If you > > try > > > = > > > > > > to enable CGMP without first disabling IGMP snooping, an error > > message > > > = > > > > > > is generated. > > > > > > 7.. LANE: LAN Emulation Client (LEC) LAN emulation client > > > (LEC)-End > > > > = > > > > > > systems that support LANE, such as network interface = > > > > > > card(NIC)-connected workstations, LAN switches with ATM uplinks > (for > > = > > > > > > example, the Catalyst family of switches), and Cisco 7500, 7000, > > 4500, > > > = > > > > > > and 4000 series routers that support ATM attachment, all require > the > > = > > > > > > implementation of a LEC. The LEC emulates an interface to a legacy > > LAN > > > = > > > > > > to the higher-level protocols. It performs data forwarding, > address > > = > > > > > > resolution, and registration of MAC addresses with the LANE server > > and > > > = > > > > > > communicates with other LECs via ATM virtual channel connections > > > (VCCs). > > > > = > > > > > > > > > > > > 8.. LAN Emulation Server (LES) LAN emulation configuration > > server > > > = > > > > > > (LECS)-The LECS maintains a database of ELANs and the ATM > > addresses > > > of > > > > = > > > > > > the LESs that control the ELANs. It accepts queries from LECs and > = > > > > > > responds with the ATM address of the LES that serves the > appropriate > > = > > > > > > ELAN/VLAN. This database is defined and maintained by the network > = > > > > > > administrator. > > > > > > 9.. Broadcast and Unknown Server (BUS) Broadcast and unknown > > > server > > > > = > > > > > > (BUS)-The BUS acts as a central point for distributing > broadcasts > > > and > > > > = > > > > > > multicasts. ATM is essentially a point-to-point technology without > = > > > > > > "any-to-any"or "broadcast" support. LANE solves this problem by = > > > > > > centralizing the broadcast support in theBUS. Each LEC must set up > a > > = > > > > > > Multicast Send VCC to the BUS. The BUS then adds the LEC as a leaf > > to > > > = > > > > > > its point-to-multipoint VCC (known as the Multicast Forward VCC). > > The > > > = > > > > > > BUS also acts as a multicast server. LANE is defined on ATM > > adaptation > > > = > > > > > > layer 5 (AAL5), which specifies a simple trailer to be appended to > a > > = > > > > > > frame before it is broken into ATMcells. The problem is that there > > is > > > no > > > > = > > > > > > way to differentiate between ATM cells from different senders when > = > > > > > > multiplexed on a virtual channel. It is assumed that cells > received > > > will > > > > = > > > > > > be in sequence, and whe the End of Message (EOM) cell arrives, you > = > > > > > > should just have to reassemble all of the cells that have already > = > > > > > > arrived. The BUS takes the sequence of cells on each Multicast > Send > > > VCC > > > > = > > > > > > and reassembles them into frames. When a full frame is received, > it > > is > > > = > > > > > > queued for sending to all of the LECs on the Multicast Forward > VCC. > > > This > > > > = > > > > > > way, all the cells from a particular data frame can be guaranteed > to > > > be > > > > = > > > > > > sent in order and not interleaved with cells from any other data > > > frames > > > > = > > > > > > on the point-to-multipoint VCC. > > > > > > 10.. LAN Emulation Configuration Server (LECS) LAN emulation > > > server > > > > = > > > > > > (LES)-The LES provides a central control point for all LECs. LECs > = > > > > > > maintain a Control Direct VCC to the LES to forward registration > and > > = > > > > > > control information. The LES maintains a point-to-multipoint VCC, > > > known > > > > = > > > > > > as the Control Distribute VCC, to all LECs. The Control Distribute > > VDD > > > = > > > > > > is used only to forward control information. As new LECs join the > > ATM > > > = > > > > > > ELAN, each LEC is added as a leaf to the control distribute tree. > > > > > > 12. Simple Server Replication Protocol (SSRP) = > > > > > > http://www.cisco.com/warp/public/121/ssrpconfig.html > > > > > > > > > > > > > > > > > > 1.. Internet Protocol (IP)=20 > > > > > > 1.. Addressing: Classless Interdomain Routing (CIDR), > > subnetting, > > > = > > > > > > Address Resolution Protocol (ARP), Network Address Translation > > (NAT), > > > = > > > > > > Hot Standby Router Protocol (HSRP) > > > > > > 2.. Services: Domain Name System (DNS), Bootstrap Protocol > > > (BOOTP), > > > > = > > > > > > Dynamic Host Configuration Protocol (DHCP), Internet Control > Message > > = > > > > > > Protocol (ICMP) > > > > > > 3.. Applications: Telnet, File Transfer Protocol (FTP), > Trivial > > > File > > > > = > > > > > > Transfer Protocol (TFTP) > > > > > > 4.. Transport: IP fragmentation, sockets, ports=20 > > > > > > 5.. Access Lists=20 > > > > > > > > > > > > 1.. IP Routing Protocols=20 > > > > > > 1.. Open Shortest Path First (OSPF):=20 > > > > > > i. > > > = > > > > > > Design: areas, virtual links, stub, not so stubby areas (NSSA), > area > > = > > > > > > border router (ABR) / autonomous system boundary router (ASBR) = > > > > > > redistributions, media dependencies, external vs. internal, = > > > > > > summarization=20 > > > > > > > > > > > > ii. > > > = > > > > > > Operation: Designated Router (DR), Backup Designated Router (BDR), > = > > > > > > adjacencies, link-state advertisement (LSA) types, link-state > > > database, > > > > = > > > > > > shortest path first (SPF) algorithm, authentication=20 > > > > > > > > > > > > 1.. Border Gateway Protocol (BGP):=20 > > > > > > i. > > > = > > > > > > Design: Peer Groups, Route Reflectors, Confederations, Clusters, = > > > > > > Attributes, Autonomous Systems (AS)=20 > > > > > > > > > > > > ii. > > > = > > > > > > Operation: Route Maps, Filters, Neighbors, decision algorithm, > > > Interior > > > > = > > > > > > Border Gateway Protocol (IBGP), Exterior Border Gateway Protocol > > > > (EBGP)=20 > > > > > > > > > > > > 1.. Enhanced Interior Gateway Routing Protocol (EIGRP): > Metrics, > > = > > > > > > mechanics, & design=20 > > > > > > 2.. Intermediate System to Intermediate System (IS-IS): > Metrics, > > = > > > > > > mechanics, & design=20 > > > > > > 3.. Routing Information Protocol > > > > > > (RIP) & RIP v2: : Metrics, mechanics, & design=20 > > > > > > 4.. Multicast: Design, Protocol Independent Multicast (PIM - > > both > > > = > > > > > > sparse and dense), Distance Vector Multicast Routing Protocol > > (DVMRP), > > > = > > > > > > Internet Group Management Protocol (IGMP) > > > > > > 5.. Access lists: distribute lists, route maps, policy > routing, > > = > > > > > > redistribution, route tagging=20 > > > > > > > > > > > > 1.. Desktop Protocols=20 > > > > > > 1.. Internetwork Packet Exchange (IPX): NetWare Link Services > = > > > > > > Protocol. (NLSP), IPX-RIP, IPX-Service Advertising Protocol (SAP), > = > > > > > > IPX-EIGRP, Sequenced Packet Exchange (SPX), Network Control > Protocol > > = > > > > > > (NCP), IPXWAN, IPX addressing, Get Nearest Server (GNS), Novell = > > > > > > Directory Services (routing & mechanisms), access lists=20 > > > > > > 2.. AppleTalk: Routing Table Maintenance Protocol (RTMP), > > > AppleTalk > > > > = > > > > > > Update-Based Routing Protocol (AURP), Appletalk-EIGRP, Datagram > > > Delivery > > > > = > > > > > > Protocol (DDP), Zone Information Protocol (ZIP), Name Binding > > Protocol > > > = > > > > > > (NBP), addressing (phase 1 & 2), access lists=20 > > > > > > 3.. DECnet/OSI: Addressing, access lists=20 > > > > > > 4.. Windows NT: NetBIOS, browsing, domain controller (e.g. > > WINS), > > > = > > > > > > access lists=20 > > > > > > > > > > > > 1.. Performance Management=20 > > > > > > 1.. Traffic Management: Queuing, Weighted Fair Queuing (WFQ), > = > > > > > > Resource Reservation Protocol (RSVP), traffic shaping, load > > > balancing=20 > > > > > > > > > > > > 1.. WAN (addressing, signaling, framing)=20 > > > > > > 1.. ISDN: Link Access Procedure on the D channel (LAPD), Basic > > > Rate > > > > = > > > > > > Interface (BRI) / Primary Rate Interface (PRI) framing, signaling, > = > > > > > > mapping, dialer map, interface types, B/D channels, PPP > Multilink=20 > > > > > > 2.. Frame relay: Local Management Interface (LMI), Data Link = > > > > > > Connection Identifier (DLCI), Permanent Virtual Circuit (PVC), > > > framing, > > > > = > > > > > > traffic shaping, forward explicit congestion notification (FECN), > = > > > > > > backward explicit congestion notification (BECN), CIR, discard > > > eligible > > > > = > > > > > > (DE), mapping, compression=20 > > > > > > 3.. X.25: addressing, routing, Link Access Procedure Balanced > = > > > > > > (LAPB), error control/recovery, windowing, signaling, mapping, > > > Switched > > > > = > > > > > > Virtual Circuit (SVC) / Permanent Virtual Circuit (PVC), Protocol > = > > > > > > Translation=20 > > > > > > 4.. ATM: Switched Virtual Connection (SVC) / Permanent Virtual > = > > > > > > Connection (PVC), ATM Adaptation Layer (AAL), Service Specific = > > > > > > Connection Oriented Protocol (SSCOP), User-Network Interface (UNI) > / > > = > > > > > > Network-Network Interface (NNI), Interim Local Management > Interface > > = > > > > > > (ILMI), Cell format, Quality of Service (QoS), RFC 1483 &1577, > > Private > > > = > > > > > > Network-Network Interface (PNNI), Interim-Interswitch Signaling > > > Protocol > > > > = > > > > > > (IISP), mapping=20 > > > > > > 5.. Physical Layer: Synchronization, Synchronous Optical > Network > > = > > > > > > (SONET), T1, E1, encoding=20 > > > > > > 6.. Leased Line Protocols: High-Level Data Link Control > (HDLC), > > = > > > > > > Point to Point Protocol (PPP), async & modems, compression=20 > > > > > > 7.. Dial on Demand Routing (DDR): dial backup=20 > > > > > > > > > > > > 1.. LAN=20 > > > > > > 1.. Datalink Layer: addressing, 802.2=20 > > > > > > 2.. Ethernet/Fast Ethernet/Gigabit Ethernet: encapsulation, > > > carrier > > > > = > > > > > > sense multiple access collision detect (CSMA/CD), topology, speed, > = > > > > > > controller errors, limitations, 802.3=20 > > > > > > 3.. Token Ring: token passing, beaconing, Active Monitor, ring > = > > > > > > insertion, soft & hard errors, encapsulation, topology, maximum = > > > > > > transmission unit (MTU), speed, limitations=20 > > > > > > 4.. FDDI/CDDI: dual ring, encapsulation, class, redundancy, > dual > > = > > > > > > homing, medium (copper, fiber), claims, Station Management (SMT), > = > > > > > > limitations=20 > > > > > > > > > > > > 1.. Security=20 > > > > > > 1.. Authentication, Authorization, and Accounting (AAA),=20 > > > > > > 2.. Terminal Access Controller Access Control System (TACACS) > = > > > > > > RADIUS: general concepts, usage, comparisons=20 > > > > > > 3.. Firewalls: PIX, access lists, demilitarized zones (DMZ)=20 > > > > > > 4.. Encryption: public/private key, Data Encryption Standard > > > > (DES)=20 > > > > > > > > > > > > 1.. Multiservice=20 > > > > > > 1.. Voice/Video:=20 > > > > > > 2.. H.323, > > > > > > 3.. codecs, > > > > > > 4.. Signaling System 7 (SS7), > > > > > > 5.. Real-Time Transport Protocol (RTP),=20 > > > > > > 6.. RTP Control Protocol (RTCP), > > > > > > 7.. Quality of Service (QoS)=20 > > > > > > =20 > > > > > > =20 > > > > > > =20 > > > > > > > > > > > > [GroupStudy.com removed an attachment of type image/gif which had > a > > > name > > > > > of > > > > > > clip_image001.gif] > > > > > > > > > > > > [GroupStudy.com removed an attachment of type image/jpeg which had > a > > > > name > > > > > of > > > > > > clip_image003.jpg] > > [EMAIL PROTECTED] Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=10353&t=10353 -------------------------------------------------- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]