Flylib.com
Network Virtualization
Network Virtualization
ISBN: 1587052482
EAN: 2147483647
Year: 2006
Pages: 128
Authors:
Victor Moreno
,
Kumar Reddy
BUY ON AMAZON
Network Virtualization
Table of Contents
Copyright
About the Author(s)
Acknowledgments
Icons Used in This Book
Command Syntax Conventions
Introduction
Part I: A Network Architecture for the Virtual Enterprise
Chapter 1. Business Drivers Behind Enterprise Network Virtualization
Why Virtualize?
Business Requirements Drive Technical Requirements
Summary
Chapter 2. Designing Scalable Enterprise Networks
Hierarchical Campus Design
Virtualizing the Campus
WAN Design
Summary
Chapter 3. A Basic Virtualized Enterprise
The Virtual Enterprise
Transport VirtualizationVNs
Central Services Access: Virtual Network Perimeter
Summary
Chapter 4. A Virtualization Technologies Primer: Theory
Network Device Virtualization
Data-Path Virtualization
Control-Plane VirtualizationRouting Protocols
Summary
Chapter 5. Infrastructure Segmentation Architectures: Theory
Hop to Hop
Tunnel Overlay for L3VPN
Tunnel Overlay for Layer 2 VPNs
Peer-Based Model for Layer 3 VPNs
Inter-Autonomous System Connectivity: Another Application of Tunnels
Summary
Part II: Enterprise Virtualization Techniques and Best Practices
Chapter 6. Infrastructure Segmentation Architectures: Practice
Hop-to-Hop VLANs
Single Address Space Solutions
Tunnel Overlay for Layer 3 VPNs
Layer 3 VPNs
Layer 2 VPNs
Summary
Chapter 7. Extending the Virtualized Enterprise over the WAN
WAN Services
Extending Segmentation over the WAN
MPLS over Layer 2 Circuits
Contracting Multiple IP VPNs
Carrier Supporting Carrier (CsC)
MPLS over GRE
RFC 2547 VPNs over L2TPv3 Tunnels
VRFs Interconnected by a GRE or DMVPN Overlay
RFC 2547 VPNs over DMVPN
Summary
Chapter 8. Traffic Steering and Service Centralization
Shared Services: Protected vs. Unprotected
Unprotected Services Access
Protected Services Access
Providing IP Services
Summary
Chapter 9. Multicast in a Virtualized Environment
Multicast Introduction
VRFs and Multicast
mVPN Transport
Connecting the WAN
Summary
Chapter 10. Quality of Service in a Virtualized Environment
QoS Models and Mechanisms: A Review
MPLS Quality of Service
MPLS Traffic Engineering and Guaranteed Bandwidth
QoS Models for Virtualized Networks
Summary
Chapter 11. The Virtualized Access Layer
Access Layer Switching
Implementing Dynamic Authentication and Authorization
Virtualizing the Access Layer
Summary
Part III: Appendixes
Appendix A. L2TPv3 Expanded Coverage
L2TPv3 Control Channel
L2TPv3 Data Channel
Appendix B. MPLS QoS, Traffic Engineering, and Guaranteed Bandwidth
MPLS QoSUniform Tunnel and Pipe Modes
MPLS Traffic Engineering
MPLS Fast Reroute
Guaranteed Bandwidth
Appendix C. Recommended Reading
Chapter 1
Chapter 4
Chapter 5
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
General technology references
Appendix D. RFCs and Internet Drafts
Chapter 4
Chapter 5
Chapter 6
Chapter 9
Chapter 10
Chapter 11
Index
SYMBOL
A
B
C
D
E
F
G
H
I
L
M
N
O
P
Q
R
S
T
U
V
W
X
Network Virtualization
ISBN: 1587052482
EAN: 2147483647
Year: 2006
Pages: 128
Authors:
Victor Moreno
,
Kumar Reddy
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
ERP Systems Impact on Organizations
ERP System Acquisition: A Process Model and Results From an Austrian Survey
The Second Wave ERP Market: An Australian Viewpoint
Data Mining for Business Process Reengineering
Intrinsic and Contextual Data Quality: The Effect of Media and Personal Involvement
Absolute Beginner[ap]s Guide to Project Management
Why Is the WBS Important?
Creating a Project Budget
Common Project Change Control Challenges
Identify, Protect, and Track: The Principles of Managing Work Products
Best Practices
Software Configuration Management
Configuration Verification and Audit
Configuration Change Management
CM Automation
Appendix E Test Plan
Appendix L Software Requirements Changes
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Review Questions
Implementing Telephony Call Restrictions and Control
Tools Overview
Alarm Configuration
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Adding New Records to a Table
Client 1Connecting to the Server
User Accounts
Roadmap (Wheres All My Stuff?)
Securing Functions
Competency-Based Human Resource Management
An Overview of Competency-Based HR Management Practices
Competency-Based Employee Recruitment and Selection
Competency-Based Performance Management
Competency-Based Employee Development
Competency-Based HR Management The Next Steps
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies