In this blog, 25.000 books will be uploaded, so far more than 1400 books are available. Books, will be added daily, please check this blog daily.
Saturday, September 17, 2011
Layer 2 VPN Architectures
By Wei Luo, - CCIE No. 13,291, Carlos Pignataro, - CCIE No. 4619, Dmitry Bokotey, - CCIE No. 4460, Anthony Chan, - CCIE No. 10,266
Publisher : Cisco Press
Pub Date : March 10, 2005
ISBN : 1-58705-168-0
Pages : 648
Synopsis
This is the eBook version of the printed book.
A complete guide to understanding, designing, and deploying Layer 2 VPN technologies and pseudowire emulation applications
Evaluate market drivers for Layer 2 VPNs
Understand the architectural frame-work and choices for Layer 2 VPNs, including AToM and L2TPv3
Grasp the essentials of Layer 2 LAN and WAN technologies
Examine the theoretical and operational details of MPLS and LDP as they pertain to AToM
Understand the theoretical and operational details of Layer 2 protocols over L2TPv3 in IP networks
Learn about Layer 2 VPN bridged and routed interworking and Layer 2 local switching
Understand the operation and application of Virtual Private LAN Services (VPLS)
Learn about foundation and advanced AToM and L2TPv3 topics through an extensive collection of case studies
The historical disconnect between legacy Layer 2 and Layer 3 VPN solutions has forced service providers to build, operate, and maintain separate infrastructures to accommodate various VPN access technologies. This costly proposition, however, is no longer necessary. As part of its new Unified VPN Suite, Cisco Systems® now offers next-generation Layer 2 VPN services like Layer 2 Tunneling Protocol version 3 (L2TPv3) and Any Transport over MPLS (AToM) that enable service providers to offer Frame Relay, ATM, Ethernet, and leased-line services over a common IP/MPLS core network. By unifying multiple network layers and providing an integrated set of software services and management tools over this infrastructure, the Cisco® Layer 2 VPN solution enables established carriers, IP-oriented ISP/CLECs, and large enterprise customers (LECs) to reach a broader set of potential VPN customers and offer truly global VPNs.
Layer 2 VPN Architectures is a comprehensive guide to consolidating network infrastructures and extending VPN services. The book opens by discussing Layer 2 VPN applications utilizing both AToM and L2TPv3 protocols and comparing Layer 3 versus Layer 2 provider-provisioned VPNs. In addition to describing the concepts related to Layer 2 VPNs, this book provides an extensive collection of case studies that show you how these technologies and architectures work. The case studies include both AToM and L2TPv3 and reveal real-world service provider and enterprise design problems and solutions with hands-on configuration examples and implementation details. The case studies include all Layer 2 technologies transported using AToM and L2TPv3 pseudowires, including Ethernet, Ethernet VLAN, HDLC, PPP, Frame Relay, ATM AAL5 and ATM cells, and advanced topics relevant to Layer 2 VPN deployment, such as QoS and scalability.
Copyright
About the Authors
About the Technical Reviewers
Acknowledgments
This Book Is Safari Enabled
Icons Used in This Book
Command Syntax Conventions
Introduction
Goals and Methods
How This Book Is Organized
Part I: Foundation
Chapter 1. Understanding Layer 2 VPNs
Understanding Traditional VPNs
Introducing Enhanced Layer 2 VPNs
Summary
Chapter 2. Pseudowire Emulation Framework and Standards
Pseudowire Emulation Overview
Pseudowire Emulation Standardization
Summary
Chapter 3. Layer 2 VPN Architectures
Legacy Layer 2 VPNs
Any Transport over MPLS Overview
Layer 2 Tunnel Protocol Version 3 Overview
Summary
Part II: Layer 2 Protocol Primer
Chapter 4. LAN Protocols
Ethernet Background and Encapsulation Overview
Metro Ethernet Overview
Metro Ethernet Service Architectures
Understanding Spanning Tree Protocol
Pure Layer 2 Implementation
802.1q Tunneling
Summary
Chapter 5. WAN Data-Link Protocols
Introducing HDLC Encapsulation
Introducing PPP Encapsulation
Understanding Frame Relay
Understanding ATM
ATM Management Protocols: ILMI and OAM
Summary
Part III: Any Transport over MPLS
Chapter 6. Understanding Any Transport over MPLS
Introducing the Label Distribution Protocol
Understanding AToM Operations
Summary
Chapter 7. LAN Protocols over MPLS Case Studies
Understanding Ethernet over MPLS Technology
EoMPLS Transport Case Studies
Common Troubleshooting Techniques
Summary
Chapter 8. WAN Protocols over MPLS Case Studies
Setting Up WAN over MPLS Pseudowires
Introducing WAN Protocols over MPLS
Configuring WAN Protocols over MPLS Case Studies
Advanced WAN AToM Case Studies
Summary
Chapter 9. Advanced AToM Case Studies
Load Sharing
Preferred Path
Case Study 9-5: Protecting AToM Pseudowires with MPLS Traffic Engineering Fast Reroute
Case Study 9-6: Configuring AToM Pseudowire over GRE Tunnel
Pseudowire Emulation in Multi-AS Networks
Case Study 9-10: Configuring LDP Authentication for Pseudowire Signaling
Verifying Pseudowire Data Connectivity
Quality of Service in AToM
Summary
Part IV: Layer 2 Tunneling Protocol Version 3
Chapter 10. Understanding L2TPv3
Universal Transport Interface: L2TPv3's Predecessor
Introducing L2TPv3
Summary
Chapter 11. LAN Protocols over L2TPv3 Case Studies
Introducing the L2TPv3 Configuration Syntax
LAN Protocols over L2TPv3 Case Studies
Summary
Chapter 12. WAN Protocols over L2TPv3 Case Studies
WAN Protocols over L2TPv3 Technology Overview
Configuring WAN Protocols over L2TPv3 Case Studies
Summary
Chapter 13. Advanced L2TPv3 Case Studies
Case Study 13-1: L2TPv3 Path MTU Discovery
Advanced ATM Transport over L2TPv3
Quality of Service
Summary
Part V: Additional Layer 2 VPN Architectures
Chapter 14. Layer 2 Interworking and Local Switching
Layer 2 Interworking Technology Overview
Layer 2 Interworking Case Studies
Layer 2 Local Switching
Layer 2 Local Switching with Interworking
Understanding Advanced Interworking and Local Switching
Summary
Chapter 15. Virtual Private LAN Service
Understanding VPLS Fundamentals
VPLS Deployment Models
VPLS Configuration Case Studies
Summary
Appendix 1. L2TPv3 AVP Attribute Types
Index
Another VPN Books
Download
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment