Part I: Foundation Chapter 1Understanding Layer 2 VPNsChapter 2Pseudowire Emulation Framework and StandardsChapter 3Layer 2 VPN Architectures