Index
[SYMBOL][A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
P-network (provider network) P-router (provider router) Packet over SONET (PoS)packets Carrier's Carrier architecture core inter-AS TE LSPs loss Multicast encapsulation out-of-profile pseudowire flow QoS application requirements IETF DiffServ models mechanisms SLAs 2nd utilization curve comparisons SPD tuning VPN deliveryparameters discovery resizing partnerships Path Computation Element (PCE) 2nd Path MTU Discovery (PMTU)paths end-to-end inter-AS TE LSPs load balancing protection recovery Set of Ordered Path option TE LSP computation 2nd extensions traffic engineering PCE (Path Computation Element) 2nd PE (pseudowire edge) equipment PE-CE data plane protection template PE-CE links PE-PSTN routers, failure of PE-PSTN1 routers, TE LSPs between PE-routers (provider edge-routers) ATM pseudowires configuration control-plane requirements data center Layer 3 MPLS VPN design egress policy engineering guidelines filtering IP address allocation IPv6 label allocation multiservice mVPN configuration network management VPNs route target formats routing protocol design VPNv4 prefix creation peer-to-peer applications peering, VPNv4 RRs penalties, flaps Penultimate Hop Popping (PHP) 2nd per-hop behavior (PHB) 2nd performance of SLAs period of time (use of backup tunnels) PHB (per-hop behavior) 2nd PhoneNet Layer 3 MPLS VPN design QoS PHP (Penultimate Hop Popping) 2nd PIM (Protocol-Independent Multicast) PIM-SM placement of TE LSPs planned router maintenance planning capacity 2nd PMTU (Path MTU Discovery) PNNI (Private Network-Network Interface) POI (point of insertion) Point-to-Point Protocol over ATM Point-to-Point Protocol over Ethernet Point-to-Point SLS models Points of Presence (POPs) points, convergencepolicies 100+Mbps QoS control at ASBR boundaries DSCP mapping import/export (VPN) QoS six-queue sub-100-Mbps To-Fab QoS policing 2nd POP-to-POP SLA commitments POPs (Points of Presence) 2nd backup tunnels core network inter-POP connectivity (USCom) Layer 3 MPLS VPN design level 1 design (USCom) MPC national telco design study network structure 2nd SLA commitments virtual POP design 2nd portfolios, services PoS (Packet over SONET) PPPoA (Point-to-Point Protocol over ATM) PPPoE (Point-to-Point Protocol over Ethernet) PQ (Priority Queuing)preemption TE LSPs traffic engineeringprefixes discovery prioritization restrictions VPNv4 prioritization of prefixes Priority Queuing (PQ) priority, defining (preemption) private private autonomous system numbers Private Network-Network Interface (PNNI) process IDs (OSPF) profiles, WREDpropagation delay delay end-to-end protection by fast reroute (traffic engineering) comparison to restoration traffic engineering paths VPNs Protocol-Independent Multicast (PIM)protocols BGP disabling EIGRP IGP interaction LDP 2nd 3rdrouting design Multicast RSVP-TE RTCP TCP TDPprovider edge (PE) routers.
[See PE-routers] provider network (P-network) provider router (P-router)provisioning access backup tunnels services TE LSPs pseudowire edge (PE) equipment pseudowire identifier (PWid) pseudowiresATM PE router failures TE ATM design QoS PSTN (Public Switched Telephone Network) dial-in access (via L2TP VPDN) PE-PSTN router failure recovery TE LSPs bandwidth trunkingPVCs (private virtual circuits) ATM QoS Frame Relay PWid (pseudowire identifier)