Flylib.com
Selecting MPLS VPN Services
Selecting MPLS VPN Services
ISBN: 1587051915
EAN: 2147483647
Year: 2004
Pages: 136
Authors:
Chris Lewis
,
Steve Pickavance
BUY ON AMAZON
Selecting MPLS VPN Services
Table of Contents
Copyright
About the Authors
Acknowledgments
Icons Used in This Book
Command Syntax Conventions
Introduction
Part I: Business Analysis and Requirements of IPMPLS VPN
Chapter 1. Assessing Enterprise Legacy WANs and IPVPN Migration
Current State of Enterprise Networks
Evolutionary Change of Enterprise Networks
Acme, a Global Manufacturer
New WAN Technologies for Consideration by Acme
Convergence Services
Summary
Chapter 2. Assessing Service Provider WAN Offerings
EnterpriseService Provider Relationship and Interface
Investigation Required in Selecting a Service Provider
Service Management
Summary
Chapter 3. Analyzing Service Requirements
ApplicationBandwidth Requirements
Backup and Resiliency
Enterprise Segmentation Requirements
Access Technologies
QoS Requirements
Subscriber Network QoS Design
Security Requirements
Multiprovider Considerations
Extranets
Case Study: Analyzing Service Requirements for Acme, Inc.
Summary
References
Part II: Deployment Guidelines
Chapter 4. IP Routing with IPMPLS VPNs
Introduction to Routing for the Enterprise MPLS VPN
Site Typifying WAN Access: Impact on Topology
Case Study: BGP and EIGRP Deployment in Acme, Inc.
Summary
References
Chapter 5. Implementing Quality of Service
Introduction to QoS
QoS Tool Chest: Understanding the Mechanisms
Building the Policy Framework
IPVPN QoS Strategy
Identification of Traffic
QoS Requirements for Voice, Video, and Data
The LAN Edge: L2 Configurations
Case Study: QoS in the Acme, Inc. Network
QoS Reporting
Summary
References
Chapter 6. Multicast in an MPLS VPN
Introduction to Multicast for the Enterprise MPLS VPN
Mechanics of IP Multicast
Multicast Deployment Models
Multicast in an MPLS VPN Environment: Transparency
Case Study: Implementing Multicast over MPLS for Acme
What Happens When There Is No MVPN Support?
Summary
References
Chapter 7. Enterprise Security in an MPLS VPN Environment
Setting the Playing Field
Comparing MPLS VPN Security to Frame Relay Networks
Issues for Enterprises to Resolve When Connecting at Layer 3 to Provider Networks
Basic Security Techniques
Distributed DoS, Botnets, and Worms
Case Study Selections
Summary
References
Chapter 8. MPLS VPN Network Management
The Enterprise: Evaluating Service Provider Management Capabilities
The Enterprise: Managing the VPN
The Service Provider: How to Meet and Exceed Customer Expectations
Summary
References
Chapter 9. Off-Net Access to the VPN
Remote Access
IPsec Access
Supporting Internet Access in IP VPNs
Case Study Selections
Summary
References
Chapter 10. Migration Strategies
Network Planning
Implementation Planning
On-Site Implementation
Case Study Selections
Summary
Part III: Appendix
Appendix A. Questions to Ask Your Provider Regarding Layer 3 IPMPLS VPN Capability
Coverage and Topology
Customer Edge Router Management
Network Access, Resiliency, and Load Balancing
QoS Capability
Multicast Capability
Routing Protocol Capability
Security
Software Deployment Processes
Inter-Provider IPVPN
IPv6
MTU Considerations
Hosting Capability
IP Telephony PSTN Integration
IP Telephony Hosted Call Agent
Remote and Dial Access
Internet Access
Other Network Services
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
Z
Selecting MPLS VPN Services
ISBN: 1587051915
EAN: 2147483647
Year: 2004
Pages: 136
Authors:
Chris Lewis
,
Steve Pickavance
BUY ON AMAZON
Absolute Beginner[ap]s Guide to Project Management
Defining a Project
Management Fundamentals for Project Control
Typical Problems
Managing Project Quality
Critical Aspects of Expectations
Lotus Notes and Domino 6 Development (2nd Edition)
Creating Your Own Templates
Working with Statements
Calculations
Creating Workflow Applications
Using the Design Synopsis
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Overview of Java UI Toolkits and SWT/JFace
SWT Graphics and Image Handling
JFace Wizards
Drawing Diagrams with Draw2D
Sample Application
Introduction to 80x86 Assembly Language and Computer Architecture
Parts of a Computer System
Bit Manipulation
Decimal Arithmetic
Appendix A Hexadecimal/ASCII conversion
Appendix C MASM 6.11 Reserved Words
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 24. Search for Events by Location
Hack 28. How Big Is That, Exactly?
Hacks 4250: Introduction
Hack 45. Share Pictures with Your Community
Hack 52. Put a Map and HTML into Your Info Windows
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
Attacking the TNS Listener and Dispatchers
Accessing the File System
Accessing the Network
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies