Price:
$3,695.00
Days:
1
Virtual
– • Introduce IP multicast services to evaluate the functional model of IP multicasting and the technologies present in IP multicasting, acknowledge IP multicast benefits and associated caveats, and determine various types of multicast applications in order to understand the IP multicast conceptual model and its implementation prerequisites.
– • Identify IP multicast issues on a data-link layer, explain the methods of mapping network layer multicast addresses to data-link layer addresses, and list the mechanisms for constraining multicast streams in a LAN environment.
– • Introduce Protocol Independent Multicast sparse mode (PIM-SM) as the most current scalable IP multicast routing protocol to learn the principles of protocol operation and details, become familiar with the determinism built into sparse mode multicast protocols, and configure and deploy PIM-SM in complex IP multicast network deployments.
– • Review RP distribution solutions, recognize the drawbacks of manual RP configuration, become familiar with the Auto-Rendezvous Point (Auto-RP) and the bootstrap router (BSR) mechanisms, and introduce the concept of Anycast RP that works in combination with the Multicast Source Discovery Protocol (MSDP).
– • Recognize the drawbacks of the Protocol Independent Multicast sparse mode (PIM-SM) and introduce two extensions to provide possible solutions, learn about the mechanics of the Source Specific Multicast (SSM) and bidirectional mode of PIM-SM in order to configure and deploy SSM and bidirectional mode of the PIM-SM in a large service provider network.
– • Explain basic concepts of Multiprotocol BGP (MP-BGP) and its use in the IP multicast environment, and apply steps associated with configuring MP-BGP with Address Family Identifier (AFI) syntax to support IP multicast in the interdomain environment.
– • Configure and deploy MSDP in the interdomain environment.
– • Introduce solutions to mitigate security issues in the IP multicast network. Examine and implement suitable virtual private network (VPN) technologies, such as Generic Routing Encapsulation (GRE) with IP Security (IPsec) and Group Encrypted Transport (GET) VPN.
– • Describe the process of monitoring and maintaining multicast high-availability operations. Introduce the PIM triggered join feature and describe how load splitting IP multicast traffic over Equal-Cost Multipath (ECMP) works.
– • After gaining knowledge of multicast and multicast-related technologies in the previous modules, face and challenge yourself with three real-life scenarios for applications of multicast. You will be able to answer and design multicast-related application and network challenges in customer and service provider networks.
No specific prerequisites are required for this course. Basic computer literacy and familiarity with fundamental concepts in the subject area are recommended for the best learning experience.
• Rendezvous Point Engineering
• Rendezvous Point Engineering
• Rendezvous Point Engineering
• PIM Sparse Mode
• PIM Sparse Mode
• PIM Sparse Mode
• Interdomain IP Multicast
• Interdomain IP Multicast
• Interdomain IP Multicast
• Multiprotocol Extensions for BGP
• Multiprotocol Extensions for BGP
• Multiprotocol Extensions for BGP
• Applications of Multicast
• Applications of Multicast
• Applications of Multicast
• Multicast Optimization and High Availability Features
• Multicast Optimization and High Availability Features
• Multicast Optimization and High Availability Features
• Lab
• Lab
• Lab
• IP Multicast Security
• IP Multicast Security
• IP Multicast Security
• PIM Sparse Mode Protocol Extensions
• PIM Sparse Mode Protocol Extensions
• PIM Sparse Mode Protocol Extensions
• Multicast on the LAN
• Multicast on the LAN
• Multicast on the LAN
• IP Multicast Concepts and Technologies
• IP Multicast Concepts and Technologies
• IP Multicast Concepts and Technologies
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.
Give your organization the skills edge it needs. Our corporate training experts will work with you to design, deliver, and support a customized IT program that drives real business results.