Layer 2 VPN architectures / Wei Luo [and others] ; technical reviewers, Archana Sharma [and others].

A complete guide to understanding, designing, and deploying Layer 2 VPN technologies and pseudowire emulation applications Evaluate market drivers for Layer 2 VPNs Understand the architectural frame-work and choices for Layer 2 VPNs, including AToM and L2TPv3 Grasp the essentials of Layer 2 LAN and...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via O'Reilly/Safari)
Main Author: Wei, Luo (Author)
Other Authors: Sharma, Archana (Reviewer)
Format: eBook
Language:English
Published: Indianapolis, Ind. : Cisco Press, ©2005.
Subjects:

MARC

LEADER 00000cam a2200000Ma 4500
001 b10278079
006 m o d
007 cr |||||||||||
008 100806s2005 inua o 001 0 eng d
005 20240829144149.3
010 |a  2003109688 
015 |a GBA516304  |2 bnb 
016 7 |a 013118899  |2 Uk 
019 |a 1064033092  |a 1100839957  |a 1103278752  |a 1129362204  |a 1153055029  |a 1192348687  |a 1202537756  |a 1240514481 
020 |z 1587051680  |q (hbk.) 
020 |z 9781587058486 
020 |z 9781587051685 
024 8 |a 9781587051685 
024 8 |a 1587051680 
029 1 |a AU@  |b 000053260113 
029 1 |a AU@  |b 000067101982 
035 |a (OCoLC)safo657075628 
035 |a (OCoLC)657075628  |z (OCoLC)1064033092  |z (OCoLC)1100839957  |z (OCoLC)1103278752  |z (OCoLC)1129362204  |z (OCoLC)1153055029  |z (OCoLC)1192348687  |z (OCoLC)1202537756  |z (OCoLC)1240514481 
037 |a safo1587051680 
040 |a COO  |b eng  |e pn  |c COO  |d CEF  |d OCLCQ  |d B24X7  |d OCLCQ  |d OCLCF  |d OCLCO  |d OCLCQ  |d LIV  |d COO  |d WYU  |d VT2  |d OCLCO  |d OCLCQ  |d WSU  |d OCLCO  |d OCLCL 
049 |a GWRE 
050 4 |a TK5101.875.E87  |b L39 2005eb 
245 0 0 |a Layer 2 VPN architectures /  |c Wei Luo [and others] ; technical reviewers, Archana Sharma [and others]. 
260 |a Indianapolis, Ind. :  |b Cisco Press,  |c ©2005. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
347 |a text file 
500 |a Title from title screen. 
500 |a Includes index. 
520 |a A complete guide to understanding, designing, and deploying Layer 2 VPN technologies and pseudowire emulation applications Evaluate market drivers for Layer 2 VPNs Understand the architectural frame-work and choices for Layer 2 VPNs, including AToM and L2TPv3 Grasp the essentials of Layer 2 LAN and WAN technologies Examine the theoretical and operational details of MPLS and LDP as they pertain to AToM Understand the theoretical and operational details of Layer 2 protocols over L2TPv3 in IP networks Learn about Layer 2 VPN bridged and routed interworking and Layer 2 local switching Understand the operation and application of Virtual Private LAN Services (VPLS) Learn about foundation and advanced AToM and L2TPv3 topics through an extensive collection of case studies The historical disconnect between legacy Layer 2 and Layer 3 VPN solutions has forced service providers to build, operate, and maintain separate infrastructures to accommodate various VPN access technologies. This costly proposition, however, is no longer necessary. As part of its new Unified VPN Suite, Cisco Systems® now offers next-generation Layer 2 VPN services like Layer 2 Tunneling Protocol version 3 (L2TPv3) and Any Transport over MPLS (AToM) that enable service providers to offer Frame Relay, ATM, Ethernet, and leased-line services over a common IP/MPLS core network. By unifying multiple network layers and providing an integrated set of software services and management tools over this infrastructure, the Cisco® Layer 2 VPN solution enables established carriers, IP-oriented ISP/CLECs, and large enterprise customers (LECs) to reach a broader set of potential VPN customers and offer truly global VPNs. Layer 2 VPN Architectures is a comprehensive guide to consolidating network infrastructures and extending VPN services. The book opens by discussing Layer 2 VPN applications utilizing both AToM and L2TPv3 protocols and comparing Layer 3 versus Layer 2 provider-provisioned VPNs. In addition to describing the concepts related to Layer 2 VPNs, this book provides an extensive collection of case studies that show you how these technologies and architectures work. The case studies include both AToM and L2TPv3 and reveal real-world service provider and enterprise design problems and solutions with hands-on configuration examples and implementation details. The case studies include all Layer 2 technologies transported using AToM and L2TPv3 pseudowires, including Ethernet, Ethernet VLAN, HD... 
542 |f Copyright© 2005 Cisco Systems, Incorporated  |g 2005 
650 0 |a Extranets (Computer networks) 
650 7 |a Extranets (Computer networks)  |2 fast 
655 0 |a Electronic book. 
700 1 |a Wei, Luo.  |4 aut 
700 1 |a Sharma, Archana.  |4 rev 
758 |i has work:  |a Layer 2 VPN architectures (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFxcVM3kJkkM8jdRgXG8RX  |4 https://id.oclc.org/worldcat/ontology/hasWork 
856 4 0 |u https://go.oreilly.com/UniOfColoradoBoulder/library/view/~/1587051680/?ar  |z Full Text (via O'Reilly/Safari) 
915 |a M 
956 |a O'Reilly-Safari eBooks 
956 |b O'Reilly Online Learning: Academic/Public Library Edition 
994 |a 92  |b COD 
998 |b Subsequent record output 
999 f f |i 2999ea08-140b-5555-9217-5e3fc4b8c1da  |s 10d97f3e-6e1c-5e89-b5bb-e8bf83915d06 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e TK5101.875.E87 L39 2005eb  |h Library of Congress classification  |i web  |n 1