Flylib.com
Selecting MPLS VPN Services
Selecting MPLS VPN Services
ISBN: 1587051915
EAN: 2147483647
Year: 2004
Pages: 136
Authors:
Chris Lewis
,
Steve Pickavance
BUY ON AMAZON
Selecting MPLS VPN Services
Table of Contents
Copyright
About the Authors
Acknowledgments
Icons Used in This Book
Command Syntax Conventions
Introduction
Part I: Business Analysis and Requirements of IPMPLS VPN
Chapter 1. Assessing Enterprise Legacy WANs and IPVPN Migration
Current State of Enterprise Networks
Evolutionary Change of Enterprise Networks
Acme, a Global Manufacturer
New WAN Technologies for Consideration by Acme
Convergence Services
Summary
Chapter 2. Assessing Service Provider WAN Offerings
EnterpriseService Provider Relationship and Interface
Investigation Required in Selecting a Service Provider
Service Management
Summary
Chapter 3. Analyzing Service Requirements
ApplicationBandwidth Requirements
Backup and Resiliency
Enterprise Segmentation Requirements
Access Technologies
QoS Requirements
Subscriber Network QoS Design
Security Requirements
Multiprovider Considerations
Extranets
Case Study: Analyzing Service Requirements for Acme, Inc.
Summary
References
Part II: Deployment Guidelines
Chapter 4. IP Routing with IPMPLS VPNs
Introduction to Routing for the Enterprise MPLS VPN
Site Typifying WAN Access: Impact on Topology
Case Study: BGP and EIGRP Deployment in Acme, Inc.
Summary
References
Chapter 5. Implementing Quality of Service
Introduction to QoS
QoS Tool Chest: Understanding the Mechanisms
Building the Policy Framework
IPVPN QoS Strategy
Identification of Traffic
QoS Requirements for Voice, Video, and Data
The LAN Edge: L2 Configurations
Case Study: QoS in the Acme, Inc. Network
QoS Reporting
Summary
References
Chapter 6. Multicast in an MPLS VPN
Introduction to Multicast for the Enterprise MPLS VPN
Mechanics of IP Multicast
Multicast Deployment Models
Multicast in an MPLS VPN Environment: Transparency
Case Study: Implementing Multicast over MPLS for Acme
What Happens When There Is No MVPN Support?
Summary
References
Chapter 7. Enterprise Security in an MPLS VPN Environment
Setting the Playing Field
Comparing MPLS VPN Security to Frame Relay Networks
Issues for Enterprises to Resolve When Connecting at Layer 3 to Provider Networks
Basic Security Techniques
Distributed DoS, Botnets, and Worms
Case Study Selections
Summary
References
Chapter 8. MPLS VPN Network Management
The Enterprise: Evaluating Service Provider Management Capabilities
The Enterprise: Managing the VPN
The Service Provider: How to Meet and Exceed Customer Expectations
Summary
References
Chapter 9. Off-Net Access to the VPN
Remote Access
IPsec Access
Supporting Internet Access in IP VPNs
Case Study Selections
Summary
References
Chapter 10. Migration Strategies
Network Planning
Implementation Planning
On-Site Implementation
Case Study Selections
Summary
Part III: Appendix
Appendix A. Questions to Ask Your Provider Regarding Layer 3 IPMPLS VPN Capability
Coverage and Topology
Customer Edge Router Management
Network Access, Resiliency, and Load Balancing
QoS Capability
Multicast Capability
Routing Protocol Capability
Security
Software Deployment Processes
Inter-Provider IPVPN
IPv6
MTU Considerations
Hosting Capability
IP Telephony PSTN Integration
IP Telephony Hosted Call Agent
Remote and Dial Access
Internet Access
Other Network Services
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
Z
Selecting MPLS VPN Services
ISBN: 1587051915
EAN: 2147483647
Year: 2004
Pages: 136
Authors:
Chris Lewis
,
Steve Pickavance
BUY ON AMAZON
Java I/O
Output Streams
The jar Tool
JarFile
Converting Between Byte Arrays and Strings
Temperature Sensor Example
Beginning Cryptography with Java
Object Description in Cryptography Using ASN.1
Distinguished Names and Certificates
Appendix A Solutions to Exercises
Appendix B Algorithms Provided by the Bouncy Castle Provider
Appendix C Using the Bouncy Castle API for Elliptic Curve
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Cisco UE Applications Architecture
The Cisco 7920 Wireless IP Phone
Step 8: Interconnecting Multiple Cisco IPC Express Systems
Summary
Troubleshooting Installation Problems
Network Security Architectures
Secure Networking Threats
Components of a Hardening Strategy
Applied Knowledge Questions
References
Teleworker Security Design
An Introduction to Design Patterns in C++ with Qt 4
Review Questions
Threads and QThread
Validation and Regular Expressions
Meta Objects, Properties, and Reflective Programming
Multiple Inheritance
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Social Actors
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies