Sign up
Forgot password?
FAQ: Login

Luo W., Pignataro C., Bokotey D., Chan A. Layer 2 VPN Architectures

  • pdf file
  • size 8,01 MB
Luo W., Pignataro C., Bokotey D., Chan A. Layer 2 VPN Architectures
Cisco Press, 2005. — 751 p. — ISBN: 1-58705-168-0
The goal of this book is to introduce you to the technologies and practices related to
Layer 2 VPN architectures and Pseudowire Emulation, including the following:
- Addresses Layer 2 VPN applications utilizing both AToM and L2TPv3 protocols providing extensive conceptual background.
- Compares Layer 3 versus Layer 2 provider provisioned VPNs.
- Discusses IETF standardization activities for pseudowire emulation edge-toedge and Layer 2 VPNs.
- Describes mechanisms used to decode control plane signaling and data plane pseudowire packets.
- Specifies and exemplifies how to maintain quality of service (QoS) in AToM and L2TPv3 pseudowire environments.
- Provides advanced AToM topics such as load-sharing, inter-AS scenarios, and VCCV.
- Describes Path MTU Discovery mechanisms and issues in L2TPv3 networks.
- Introduces VPLS concepts, design, and configurations.
- Details how to achieve security and authentication.
In addition to describing the concepts related to Layer 2 VPNs, this book provides an extensive collection of case studies that show you how the technologies and architectures work. The case studies include both AToM and L2TPv3 and reveal real world service provider and enterprise design problems and solutions with hands-on configuration examples and implementation details. The case studies include all
Layer 2 technologies transported using AToM and L2TPv3 pseudowires including Ethernet, Ethernet VLAN, HDLC, PPP, Frame Relay, ATM AAL5 and ATM cells, and advanced cases.
After reading this book, you should be able to understand, describe, and explain Layer 2 architectures and design, configure and troubleshoot complex network scenarios that use AToM and L2TPv3.
  • Sign up or login using form at top of the page to download this file.
  • Sign up
Up