S



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

sample QoS policy template
sample RFP table of contents
scalability
     limiting factors
     of multicasting live events
     of routing protocols
scavenger data traffic
scheduling
SCR (sustainable cell rate)
security
    ACLs
         infrastructure ACLs
         receive ACLs
    attack mitigation techniques
         backscatter traceback 2nd
         Cisco Guard
         loose uRPF for source-based filtering
         remote-triggered black-hole filtering
         sinkholes
         strict uRPF 2nd
    authentication
         MD5
     authentication mechanisms
         MD5 authentication
         plaintext password authentication
     connecting at Layer 3 to provider networks 2nd
     DoS attacks
     IETF drafts
     multi-VRF CE
    of two-label MPLS imposition
         comparing to Frame Relay operation 2nd
     password management
     per-customer firewalls within provider network
     premigration considerations
     spoofed packets, tracking
security requirements
     SP-managed VPNs
     topology/design considerations
segmentation requirements
     mapping VLANs to VPNs
selecting
     best route to destination
     routing protocol
     service providers
serialization delay 2nd
     effect on end-to-end latency
service bundles
     quadruple-play
     triple-play
service management
     as server provider selection criteria
service models
service provider convergence
service provider network management
     fault management
         passive
         proactive fault management 2nd 3rd 4th
         proactive monitoring 2nd 3rd 4th 5th 6th
         reactive fault management
     provisioning
     reporting 2nd
     root cause analysis
     SLA monitoring 2nd 3rd
service provider selection, considerations
     access
     convergence
     cooperation
     coverage
     customer edge router management
     customer reports
     enhanced SLAs
     financial strength of provider
     IPv6 2nd
     service management
     tiered arrangements
     transparency 2nd
         QoS 2nd
service providers
    fault monitoring
         best practices
    provisioning
         best practices
     selecting
service requirements
     Acme, Inc. case study 2nd
         congestion 2nd
         delay
         evaluation tools
         load testing 2nd
         post-transition results
         routing convergence
         TCCP
         transition issues
         vendor knowledge
     application/bandwidth requirements
     backup/resiliency requirements
     enterprise segmentation requirements
         mapping VLANs to VPNs
     extranets
     multiprovider considerations
    security
         SP-managed VPNs
         topological/design considerations
service requirements for QoS
     bandwidth
     jitter
     packet delay
     packet loss
service requirements for QoS at Layer 2
sham link
shaping [See traffic shaping.]
shared trees
    RP
         Auto-RP
     versus source trees
Short-Pipe tunneling mode
SID (Service Identifier)
single-label MPLS imposition
sinkholes
site surveys
     required tasks
Site Type A sites
     EIGRP/BGP deployment
         high-availability issues
Site Type B sites
     EIGRP/BGP deployment
Site Type C sites
     EIGRP/BGP deployment 2nd
Site Type D sites
     EIGRP/BGP deployment
site typification
     effect on topology
    Site Type A
         connection options
         topology
    Site Type B
         connection options
         topology
    Site Type C
         topology
    Site Type D
         connection options
         topology
SLA monitoring 2nd
SLAs 2nd
     CPN (Cisco Powered Network) IP Multiservice SLA
     performance characteristics, incorporating
     premigration considerations
     table of contents
slow-speed leased lines
     recommended QoS design
SNMP
     MIBs
software deployment process
     pre-migration considerations
software queuing
SoO (Site of Origin) extended community
source trees
     versus shared trees
sourcing
SP networks
     CoS requirements
     QoS transparency requirements
SP-managed VPNs
     as service requirement
SPD (Selective Packet Discard) punt limits
     exceeding
"speeds and feeds"
split tunneling
     in IPSec
SPTs (shortest-path trees)
SRST (Survivable Remote Site Telephony)
SSD (Service Selection Dashboard)
SSG (Service Selection Gateway)
SSM
     enabling
     enabling on source server's first hop routers
     host-signaling methods
SSM (Source-Specific Multicast) 2nd
static routing
     when to use
statistics
     QoS reporting
streaming services
     performance targets
strict uRPF 2nd
subscriber network QoS design
     baselines, creating
     developing 2nd
summarization
     effects of
summary of DMVPN operation
susceptibility of enterprise networks to black-hole filtering
switches
    QoS
         configuring
switching delay
system administrators
     training course outlines
Szigeti, Tim




Selecting MPLS VPN Services
Selecting MPLS VPN Services
ISBN: 1587051915
EAN: 2147483647
Year: 2004
Pages: 136

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net