Friday, May 27, 2016

How to get cloud cost reporting under control

You have to standardize on a set of descriptive tags to identify the assignment of resources to cost centers

Although vendor-written, this contributed piece does not promote a product or service and has been edited and approved by Network World editors.

Salary Survey 2016: How does your compensation stack up?
A recent report by RightScale says 71% of companies surveyed have adopted hybrid cloud, up from 58% year-over-year, but concern over cloud costs has risen to 26% from 18% three years ago. If you’re struggling to gain control over your cloud cost accounting, there’s no time like the present to address it. Solving this issue isn’t necessarily difficult when it’s tackled early, but left to languish the amount of support and technical debt you incur can become insurmountable.

At the core of this problem is the need to gain greater clarity into the breakdown of your spend based on actual usage, allowing for greater understanding of direct costs and a more granular means of managing it. This clarity comes with a catch - your ability to standardize on a set of descriptive tags to identify the assignment of resources to cost centers within your business.

Whether you’re just starting off in cloud or you’re trying to get your cost reporting under control, there are some pretty simple steps that will help you cut through the confusion and concern.

Get organized and keep it simple

For most Infrastructure as a Service (IaaS) solutions, when you begin to deploy resources you’re able to add some level of descriptive tags to help identify and organize them in a meaningful way. For most cloud cost management tools, these tags associated with resources are the dimensions on which you’ll be able to directly segment cost. As you’ve probably guessed, harnessing this tagging structure is the first critical component in identifying where your cloud costs stem from.

If you’re utilizing an Amazon Web Services (AWS)-native, tag-based solution, you should first turn on Detailed Billing Reporting with Resources and Tags. Enabling this will provide you with the core data set you can start digging into. Then there are three big decisions you need to make in terms of how you apply this to your environment:

You need to balance how you’re going to use tags (Note: tags in AWS are limited to 10 per object). Balancing functional and cost allocation usage of tags takes some finesse. Keep in mind that developers and infrastructure engineers may want to use tags for things like clustering and service discovery, so monopolizing all 10 tags in AWS for billing purposes may impact their approach to these problems and force them to implement a non-optimal solution.
You need to know what you’re able to tag and how that affects your usage of those resources (i.e. S3 buckets can be tagged, but not objects). This may also affect how you use these services once you decide how you’re going to segment costs.
You need to decide when resources need to be tagged. Some organizations unknowingly destroy untagged or incorrectly tagged resources automatically as a part of their governance routines. Be wary of this when you’ve begun this process to avoid undoing your efforts to segment costs.

Other 3rd party products offer more intricate ways of identifying resources beyond tagging, including leveraging Amazon Resource Name (ARN) path-based hierarchies that can achieve a more flexible and less limited structure. While it’s a much more flexible means of building out a cost structure hierarchy, it also requires both a prescriptive or automated approach. Using both approaches is key in launching resources. To ensure paths are set properly, also incorporating a 3rd party tool to aggregate billing and utilization data or to simply extract and present the data (more on this in a bit) is critical.

Make it easy to do the right thing
Most organizations rely heavily on this billing-level data for accounting and chargeback purposes. In working to ensure that you have a high level of accuracy in the application of tags or a resource-based allocation strategy, you have to both define a standard and then provide the means to apply it properly. When you’re allowing multiple people to launch instances or create resources in AWS, keeping this level of standardization can be tricky. This leads to a decision on whether resources outside of the segmentation model should be summarily deleted or not.

The key to compliance with a cost accounting resource segmentation structure isn’t really the carrot or the stick, it’s all about a comfortable pair of shoes. By this I mean that if you want resources to be deployed in a manner that requires significant attention to detail, you don’t necessarily need to give people positive reinforcement (a party for the team with the best compliance) or negative reinforcement (deletion of untagged resources). You do, however, need to carve out the best path possible for moving forward. Solving this problem lies in building out templates that represent the units of work that your organization needs to deploy—from instances to workloads—within the Infrastructure as Code solution of your choice.

If you’re on AWS, AWS Service Catalog allows you to build custom AWS CloudFormation templates. These templates apply tags or set paths desired based on input parameters that enable the desired setup with the right amount of variability. If you’ve embraced Infrastructure as Code fully, there are other options, including managing deployment through Chef, Puppet or Terraform. These platforms make it possible to further integrate deployment templates with other backend governance or even external cost management tools.

It’s a best practice to have reports that clearly define where your costs exist in a given deployment or even across your enterprise. If you don’t use the data beyond cost chargeback, you’re not maximizing its full potential and value. One of the great things about having data segmented around cost in an on-demand compute cost structure is that business units are prompted to ask questions they weren’t considering previously. Examples of these are:

Is it really worth $’x’ to run 15 different environments?
Can I pay less for less performance where I don’t need it?
If I pay more (scale up), can I avoid having to refactor/redevelop a part of my application?

Some of these business-level questions presented above have an underlying consideration of cost-to-value vs. a simple cost consideration. At this point, being able to include other sources of data in the overall analysis becomes critical in order to identify a relative cost as compared to performance (system or business-level). For web-scale applications, understanding the relative cost per user and being able to tie the cost of infrastructure services to client delivery or new client acquisition is just one of the capabilities that are driving innovation in the cost management market.

For steady-state and legacy workloads, the ability to easily lock-in AWS cost optimizations with Reserved Instances is a boon to traditional IT organizations looking for guidance and recommendations as they get on board with cloud. In the case of hybrid deployments (private data center + cloud), these third party tools can act as a great way to distill the enormity of data that’s available into actionable concerns. This small consideration tends to reduce the confusion and frustration of managing the cloud into a much more manageable package.

Based on everything that’s out there to help you get moving with a successful cost reporting strategy for your cloud deployments, it’s possible to satisfy your financial curiosity while also adding value to the business. While this all sounds pretty daunting for someone just starting out, get moving now and iterate over time.

McClory has been writing code, managing DevOps, and designing scalable application infrastructures for more than ten years. As COO and CTO of DualSpark, Patrick served as an expert Amazon Web Services consultant, helping clients capitalize on the benefits of cloud architecture and design with modern and innovative software, infrastructure, and automation strategies leveraging solutions from AWS. After the acquisition of DualSpark by Datapipe, McClory assumed the role of SVP of Platform Engineering and Delivery Services. To learn more about Datapipe, visit Datapipe.com.


Wednesday, May 18, 2016

400-351 CCIE Wireless Exam Topics v3.0 and Topics v3.1

400-351 CCIE Wireless Exam Topics v3.0 and Topics v3.1

Exam Number 400-351
Associated Certifications CCIE Wireless
Duration 120 minutes (90 - 110 questions)
Available Languages English
Register Pearson VUE
Exam Policies Read current policies and requirements
Exam Tutorial Review type of exam questions

The Cisco CCIE Wireless Written Exam is a 2-hour test that will validate that a wireless engineer has the expertise to plan, design, implement, operate, and troubleshoot complex enterprise WLAN networks.

Written Exam Topics v3.0 (Recommended for candidates scheduled to take the test BEFORE July 25, 2016)

Written Exam Topics v3.1 (Recommended for candidates scheduled to take the test ON July 25, 2016 and beyond)

The Cisco CCIE® Wireless Written Exam (#400-351) is a 2-hour test with 90–110 questions that will validate that a wireless engineer has the expertise to plan, design, implement, operate and troubleshoot complex enterprise WLAN networks.

The exam is closed book and no outside reference materials are allowed. The following topics are general guidelines for the content that is likely to be included on the lab exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the following guidelines may change at any time without notice.

Written Exam Topics v3.0 (Recommended for candidates who are scheduled to take the exam BEFORE July 25, 2016)

1.0 Planning & Designing WLAN Technologies 24%

1.1 Describe WLAN organizations and regulations

1.2 Describe IEEE 802.11 standards and protocols

1.3 Plan & design wireless solutions requirements

1.3.a Translate customer requirements into services and design recommendations
1.3.b Identify ambiguity and/or information gaps
1.3.c Evaluate interoperability of proposed technologies against deployed IP network infrastructure & technologies
1.3.d Select an appropriate deployment model
1.3.e Regulatory domains and country codes

1.4 RF planning, designing and validation

1.4.a RF Design / Site survey
1.4.a [i] Define the tasks/goals for a preliminary site survey
1.4.a [ii] Conduct the site survey
1.4.a [iii] Determine AP quantity, placement and antenna type
1.4.b Architect indoor and outdoor RF deployments
1.4.b [i] Coverage
1.4.b [ii] Throughput
1.4.b [iii] Voice
1.4.b [iv] Location
1.4.b [v] HD
1.4.c Construct an RF operational model that includes:
1.4.c [i] Radio resource management (Auto-RF, manual, hybrid, TPC and DCA)
1.4.c [ii] Channel use (radar, non-WiFi interference)
1.4.c [iii] Power level, overlap
1.4.c [iv] RF profiles
1.4.d Validate implemented RF deployment

2.0 Configure and Troubleshoot the Network Infrastructure 10%

2.1 Configure and troubleshoot wired infrastructure to support WLANs

2.1.a VLANs
2.1.b VTP
2.1.c STP
2.1.d Etherchannel
2.1.e HSRP
2.1.f VSS
2.1.g Stacking

2.2 Plan network infrastructure capacity

2.3 Configure and troubleshoot network connectivity for:

2.3.a WLAN clients
2.3.b WLCs
2.3.c Lightweight APs
2.3.d Autonomous APs

2.4 Configure and troubleshoot PoE for APs

2.5 Configure and troubleshoot QoS on the switching infrastructure

2.5.a MQC
2.5.b Mls qos

2.6 Configure and troubleshoot multicast on the switching infrastructure

2.6.a PIM-SM
2.6.b Auto-RP
2.6.c Static-RP
2.6.d IGMP
2.6.e IGMP snooping
2.6.f MLD

2.7 Configure and troubleshoot IPv4 connectivity

2.7.a Subnetting
2.7.b Static routing
2.7.c Basic OSPF
2.7.d Basic EIGRP

2.8 Configure and troubleshoot basic IPv6 connectivity

2.8.a Subnetting
2.8.b Static routing
2.8.c Basic OSPFv3
2.8.d Basic EIGRP address families

2.9 Configure and troubleshoot wired security

2.9.a ACLs (v4/v6)
2.9.b dot1X
2.9.c Port-security
2.9.d SXP, SGT

2.10 Configure and troubleshoot network services

2.10.a DNS
2.10.b DHCPv4 / DHCPv6
2.10.c NTP, SNTP
2.10.d SYSLOG
2.10.e SNMP
2.10.f CDP, LLDP
2.10.g SDG. mDNS

3.0 Configure and Troubleshoot an Autonomous Deployment Model 10%

3.1 Configuring and troubleshooting different modes and roles

3.1.a Root
3.1.b WGB
3.1.c Bridge

3.2 Configuring and troubleshooting SSID/MBSSID

3.3 Configuring and troubleshooting security

3.3.a L2 security policies
3.3.b Association filters
3.3.c PSPF
3.3.d Local radius
3.3.e dot1x profiles
3.3.f Guest

3.4 Configuring and troubleshooting radio settings

3.5 Configuring and troubleshooting multicast

3.6 Configuring and troubleshooting QoS

4.0 Configure and Troubleshoot a Unified Deployment Model (Centralized) 20%

4.1 Configuring and controlling management access

4.2 Configuring and troubleshooting interfaces

4.3 Configuring and troubleshooting lightweight APs

4.3.a dot1x
4.3.b LSC
4.3.c AP modes
4.3.d AP authentication / authorization
4.3.e Logging
4.3.f Local / global configuration

4.4 Configuring and troubleshooting high availability and redundancy

4.4.a Clients
4.4.b APs
4.4.c WLCs

4.5 Configuring and troubleshooting wireless segmentation

4.5.a RF profiles
4.5.b AP groups
4.5.c Flexconnect

4.6 Configuring and troubleshooting wireless security policies

4.6.a WLANs
4.6.b L2/L3 security
4.6.c Rogue policies
4.6.d Local EAP
4.6.e Local profiling
4.6.f ACLs
4.6.g Certificates

4.7 Configuring and troubleshooting Flexconnect and Office Extend

4.8 Configuring and troubleshooting Mesh

4.9 Implement RF management

4.9.a Static RF management
4.9.b Automatic RF management
4.9.c CleanAir
4.9.d Data rates

4.10 Configuring and troubleshooting WLC control plane security

4.10.a AAA
4.10.b CPU ACLs
4.10.c Management via wireless interface
4.10.d Management via dynamic interface

4.11 Configuring and troubleshooting mobility

4.11.a L2/L3 roaming
4.11.b Multicast optimization
4.11.c Mobility group scaling
4.11.d Inter-release controller mobility
4.11.e New mobility
4.11.f Mobility anchoring

4.12 Configuring and troubleshooting multicast

5.0 Configure and Troubleshoot a Unified Deployment Model (Converged) 14%

5.1 Configuring and controlling management access

5.2 Configuring and troubleshooting Interfaces

5.3 Configuring and troubleshooting lightweight APs

5.3.a dot1x
5.3.b AP authentication / authorization
5.3.c Logging
5.3.d Local / global configuration

5.4 Configuring and troubleshooting high availability and redundancy

5.4.a Clients
5.4.b APs
5.4.c WLCs

5.5 Configuring and troubleshooting wireless segmentation

5.5.a RF profiles
5.5.b AP groups

5.6 Configuring and Troubleshooting wireless security policies

5.6.a WLANs
5.6.b L2/L3 security
5.6.c Rogue policies
5.6.d Local EAP
5.6.e ACLs
5.6.f Certificates

5.7 Implement RF management

5.7.a Static RF management
5.7.b Automatic RF management
5.7.c CleanAir
5.7.d Data rates

5.8 Configuring and troubleshooting WLC control plane security

5.8.a AAA
5.8.b Basic control plane policing

5.9 Configuring and troubleshooting mobility

5.9.a L2/L3 roaming
5.9.b Multicast optimization
5.9.c Mobility group scaling
5.9.d Inter-release controller mobility
5.9.e Mobility anchoring
5.9.f SPG
5.9.g MC/MA

5.10 Configuring and troubleshooting multicast

6.0 Configure and Troubleshoot Security & Identity Management 12%

6.1 Configure and troubleshoot identity management

6.1.a Basic PKI for dot1x and webauth
6.1.b External identity sources (AD, LDAP)

6.2 Configure and troubleshoot AAA policies

6.2.a Client authentication and authorization
6.2.b Management authentication and authorization
6.2.c Client profiling and provisioning
6.2.d RADIUS attributes
6.2.e CoA

6.3 Configure and troubleshoot guest management

6.3.a Local web authentication
6.3.b Central web authentication
6.3.c Basic sponsor policy

7.0 Configure and Troubleshoot Prime Infrastructure and MSE 10%

7.1 Configure and troubleshoot management access

7.1.a AAA
7.1.b Virtual domain

7.2 Perform basic operations

7.2.a Create and deploy templates
7.2.b Operate maps
7.2.c Import infrastructure devices
7.2.d High availability
7.2.e Audits
7.2.f Client troubleshooting
7.2.g Notification receivers
7.2.h Reports

7.3 Perform maintenance operations

7.3.a Background tasks
7.3.b SW image management

7.4 Security management

7.4.a Understand rogue management
7.4.b Manage alarms and events
7.4.c Understand security index

7.5 Implement and troubleshoot MSE

7.5.a Management access
7.5.b Network services
7.5.b [i] Location
7.5.b [ii] CMX
7.5.b [iii] CleanAir
7.5.b [iv] WIPS
7.5.c NMSP

7.6 Integrate ISE

7.7 Integrate netflow

8.0 Configure and Troubleshoot WLAN media and application services 10%

8.1 Configure and troubleshoot voice over wireless

8.1.a QoS profiles
8.1.b EDCA
8.1.c WMM
8.1.d BDRL
8.1.e Admission control
8.1.f MQC

8.2 Configuring and troubleshooting video and media

8.2.a Mediastream
8.2.b Multicast-direct
8.2.c Admission control

8.3 Configuring and troubleshooting mDNS

8.3.a mDNS proxy
8.3.b Service discovery
8.3.c Service filtering

8.4 Configuring and troubleshooting AVC and netflow
CCIE Wireless Written Exam (400-351) Version 3.1


Exam Description
The Cisco CCIE® Wireless Written Exam (400-351) version 3.1 is a 2-hour test with 90–110 questions that will validate that a wireless engineer has the expertise to plan, design, implement, operate and troubleshoot complex enterprise WLAN networks.

The exam is closed book and no outside reference materials are allowed. The following topics are general guidelines for the content that is likely to be included on the lab exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the following guidelines may change at any time without notice.

Written Exam Topics v3.1 (Recommended for candidates who are scheduled to take the exam ON July 25, 2016 and beyond)

1.0 Planning & Designing WLAN Technologies 11%

1.1 Describe WLAN organizations and regulations

1.2 Describe IEEE 802.11 standards and protocols

1.3 Plan & design wireless solutions requirements

1.3.a Translate customer requirements into services and design recommendations
1.3.b Identify ambiguity and/or information gaps
1.3.c Evaluate interoperability of proposed technologies against deployed IP network infrastructure & technologies
1.3.d Select an appropriate deployment model
1.3.e Regulatory domains and country codes

1.4 RF planning, designing and validation

1.4.a RF Design / Site survey
1.4.a [i] Define the tasks/goals for a preliminary site survey
1.4.a [ii] Conduct the site survey
1.4.a [iii] Determine AP quantity, placement and antenna type
1.4.b Architect indoor and outdoor RF deployments
1.4.b [i] Coverage
1.4.b [ii] Throughput
1.4.b [iii] Voice
1.4.b [iv] Location
1.4.b [v] HD
1.4.c Construct an RF operational model that includes:
1.4.c [i] Radio resource management (Auto-RF, manual, hybrid, TPC and DCA)
1.4.c [ii] Channel use (radar, non-WiFi interference)
1.4.c [iii] Power level, overlap
1.4.c [iv] RF profiles
1.4.d Validate implemented RF deployment

2.0 Configure and Troubleshoot the Network Infrastructure 10%

2.1 Configure and troubleshoot wired infrastructure to support WLANs

2.1.a VLANs
2.1.b VTP
2.1.c STP
2.1.d Etherchannel
2.1.e HSRP
2.1.f VSS
2.1.g Stacking

2.2 Plan network infrastructure capacity

2.3 Configure and troubleshoot network connectivity for:

2.3.a WLAN clients
2.3.b WLCs
2.3.c Lightweight APs
2.3.d Autonomous APs

2.4 Configure and troubleshoot PoE for APs

2.5 Configure and troubleshoot QoS on the switching infrastructure

2.5.a MQC
2.5.b Mls qos

2.6 Configure and troubleshoot multicast on the switching infrastructure

2.6.a PIM-SM
2.6.b Auto-RP
2.6.c Static-RP
2.6.d IGMP
2.6.e IGMP snooping
2.6.f MLD

2.7 Configure and troubleshoot IPv4 connectivity

2.7.a Subnetting
2.7.b Static routing
2.7.c Basic OSPF
2.7.d Basic EIGRP

2.8 Configure and troubleshoot basic IPv6 connectivity

2.8.a Subnetting
2.8.b Static routing
2.8.c Basic OSPFv3
2.8.d Basic EIGRP address families

2.9 Configure and troubleshoot wired security

2.9.a ACLs (v4/v6)
2.9.b dot1X
2.9.c Port-security
2.9.d SXP, SGT

2.10 Configure and troubleshoot network services

2.10.a DNS
2.10.b DHCPv4 / DHCPv6
2.10.c NTP, SNTP
2.10.d SYSLOG
2.10.e SNMP
2.10.f CDP, LLDP
2.10.g SDG. mDNS

3.0 Configure and Troubleshoot an Autonomous Deployment Model 10%

3.1 Configuring and troubleshooting different modes and roles

3.1.a Root
3.1.b WGB
3.1.c Bridge

3.2 Configuring and troubleshooting SSID/MBSSID

3.3 Configuring and troubleshooting security

3.3.a L2 security policies
3.3.b Association filters
3.3.c PSPF
3.3.d Local radius
3.3.e dot1x profiles
3.3.f Guest

3.4 Configuring and troubleshooting radio settings

3.5 Configuring and troubleshooting multicast

3.6 Configuring and troubleshooting QoS

4.0 Configure and Troubleshoot a Unified Deployment Model (Centralized) 18%

4.1 Configuring and controlling management access

4.2 Configuring and troubleshooting interfaces

4.3 Configuring and troubleshooting lightweight APs

4.3.a dot1x
4.3.b LSC
4.3.c AP modes
4.3.d AP authentication / authorization
4.3.e Logging
4.3.f Local / global configuration

4.4 Configuring and troubleshooting high availability and redundancy

4.4.a Clients
4.4.b APs
4.4.c WLCs

4.5 Configuring and troubleshooting wireless segmentation

4.5.a RF profiles
4.5.b AP groups
4.5.c Flexconnect

4.6 Configuring and troubleshooting wireless security policies

4.6.a WLANs
4.6.b L2/L3 security
4.6.c Rogue policies
4.6.d Local EAP
4.6.e Local profiling
4.6.f ACLs
4.6.g Certificates

4.7 Configuring and troubleshooting Flexconnect and Office Extend

4.8 Configuring and troubleshooting Mesh

4.9 Implement RF management

4.9.a Static RF management
4.9.b Automatic RF management
4.9.c CleanAir
4.9.d Data rates

4.10 Configuring and troubleshooting WLC control plane security

4.10.a AAA
4.10.b CPU ACLs
4.10.c Management via wireless interface
4.10.d Management via dynamic interface

4.11 Configuring and troubleshooting mobility

4.11.a L2/L3 roaming
4.11.b Multicast optimization
4.11.c Mobility group scaling
4.11.d Inter-release controller mobility
4.11.e New mobility
4.11.f Mobility anchoring

4.12 Configuring and troubleshooting multicast

5.0 Configure and Troubleshoot a Unified Deployment Model (Converged) 11%

5.1 Configuring and controlling management access

5.2 Configuring and troubleshooting Interfaces

5.3 Configuring and troubleshooting lightweight APs

5.3.a dot1x
5.3.b AP authentication / authorization
5.3.c Logging
5.3.d Local / global configuration

5.4 Configuring and troubleshooting high availability and redundancy

5.4.a Clients
5.4.b APs
5.4.c WLCs

5.5 Configuring and troubleshooting wireless segmentation

5.5.a RF profiles
5.5.b AP groups

5.6 Configuring and Troubleshooting wireless security policies

5.6.a WLANs
5.6.b L2/L3 security
5.6.c Rogue policies
5.6.d Local EAP
5.6.e ACLs
5.6.f Certificates

5.7 Implement RF management

5.7.a Static RF management
5.7.b Automatic RF management
5.7.c CleanAir
5.7.d Data rates

5.8 Configuring and troubleshooting WLC control plane security

5.8.a AAA
5.8.b Basic control plane policing

5.9 Configuring and troubleshooting mobility

5.9.a L2/L3 roaming
5.9.b Multicast optimization
5.9.c Mobility group scaling
5.9.d Inter-release controller mobility
5.9.e Mobility anchoring
5.9.f SPG
5.9.g MC/MA

5.10 Configuring and troubleshooting multicast

6.0 Configure and Troubleshoot Security & Identity Management 10%

6.1 Configure and troubleshoot identity management

6.1.a Basic PKI for dot1x and webauth
6.1.b External identity sources (AD, LDAP)

6.2 Configure and troubleshoot AAA policies

6.2.a Client authentication and authorization
6.2.b Management authentication and authorization
6.2.c Client profiling and provisioning
6.2.d RADIUS attributes
6.2.e CoA

6.3 Configure and troubleshoot guest management

6.3.a Local web authentication
6.3.b Central web authentication
6.3.c Basic sponsor policy

7.0 Configure and Troubleshoot Prime Infrastructure and MSE 10%

7.1 Configure and troubleshoot management access

7.1.a AAA
7.1.b Virtual domain

7.2 Perform basic operations

7.2.a Create and deploy templates
7.2.b Operate maps
7.2.c Import infrastructure devices
7.2.d High availability
7.2.e Audits
7.2.f Client troubleshooting
7.2.g Notification receivers
7.2.h Reports

7.3 Perform maintenance operations

7.3.a Background tasks
7.3.b SW image management

7.4 Security management

7.4.a Understand rogue management
7.4.b Manage alarms and events
7.4.c Understand security index

7.5 Implement and troubleshoot MSE

7.5.a Management access
7.5.b Network services
7.5.b [i] Location
7.5.b [ii] CMX
7.5.b [iii] CleanAir
7.5.b [iv] WIPS
7.5.c NMSP

7.6 Integrate ISE

7.7 Integrate netflow

8.0 Configure and Troubleshoot WLAN media and application services 10%

8.1 Configure and troubleshoot voice over wireless

8.1.a QoS profiles
8.1.b EDCA
8.1.c WMM
8.1.d BDRL
8.1.e Admission control
8.1.f MQC

8.2 Configuring and troubleshooting video and media

8.2.a Mediastream
8.2.b Multicast-direct
8.2.c Admission control

8.3 Configuring and troubleshooting mDNS

8.3.a mDNS proxy
8.3.b Service discovery
8.3.c Service filtering

8.4 Configuring and troubleshooting AVC and netflow

9.0 Evolving Technologies 10%

9.1 Cloud

9.1.a Compare and contrast Cloud deployment models
9.1.a [i] Infrastructure, platform, and software services (XaaS)
9.1.a [ii] Performance and reliability
9.1.a [iii] Security and privacy
9.1.a [iv] Scalability and interoperability
9.1.b Describe Cloud implementations and operations
9.1.b [i] Automation and orchestration
9.1.b [ii] Workload mobility
9.1.b [iii] Troubleshooting and management
9.1.b [iv] OpenStack components

9.2 Network programmability [SDN]

9.2.a Describe functional elements of network programmability (SDN) and how they interact
9.2.a [i] Controllers
9.2.a [ii] APIs
9.2.a [iii] Scripting
9.2.a [iv] Agents
9.2.a [v] Northbound vs. Southbound protocols
9.2.b Describe aspects of virtualization and automation in network environments
9.2.b [i] DevOps methodologies, tools and workflows
9.2.b [ii] Network/application function virtualization (NFV, AFV)
9.2.b [iii] Service function chaining
9.2.b [iv] Performance, availability, and scaling considerations

9.3 Internet of Things

9.3.a Describe architectural framework and deployment considerations for Internet of Things (IoT)
9.3.a [i] Performance, reliability and scalability
9.3.a [ii] Mobility
9.3.a [iii] Security and privacy
9.3.a [iv] Standards and compliance
9.3.a [v] Migration
9.3.a [vi] Environmental impacts on the network