Chapter 1
Understanding Layer 2 VPNs
Chapter 2
Pseudowire Emulation Framework and Standards
Chapter 3
Layer 2 VPN Architectures