Layer 2 Vpn Architectures [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Layer 2 Vpn Architectures [Electronic resources] - نسخه متنی

Carlos Pignataro, Dmitry Bokotey, Anthony Chan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید







Goals and Methods


The goal of this book is to introduce you to the technologies and practices related to Layer 2 VPN architectures and Pseudowire Emulation, including the following:

Addresses Layer 2 VPN applications utilizing both AToM and L2TPv3 protocols providing extensive conceptual background.

Compares Layer 3 versus Layer 2 provider provisioned VPNs.

Discusses IETF standardization activities for pseudowire emulation edge-to-edge and Layer 2 VPNs.

Describes mechanisms used to decode control plane signaling and data plane pseudowire packets.

Specifies and exemplifies how to maintain quality of service (QoS) in AToM and L2TPv3 pseudowire environments.

Provides advanced AToM topics such as load-sharing, inter-AS scenarios, and VCCV.

Describes Path MTU Discovery mechanisms and issues in L2TPv3 networks.

Introduces VPLS concepts, design, and configurations.

Details how to achieve security and authentication.


In addition to describing the concepts related to Layer 2 VPNs, this book provides an extensive collection of case studies that show you how the technologies and architectures work. The case studies include both AToM and L2TPv3 and reveal real world service provider and enterprise design problems and solutions with hands-on configuration examples and implementation details. The case studies include all Layer 2 technologies transported using AToM and L2TPv3 pseudowires including Ethernet, Ethernet VLAN, HDLC, PPP, Frame Relay, ATM AAL5 and ATM cells, and advanced cases.

After reading this book, you should be able to understand, describe, and explain Layer 2 architectures and design, configure and troubleshoot complex network scenarios that use AToM and L2TPv3.


/ 101