Table of Contents


book cover
Network Virtualization
By Victor Moreno, -  CCIE 6908. Kumar Reddy
...............................................
Publisher: Cisco Press
Pub Date: July 19, 2006
Print ISBN-10: 1-58705-248-2
Print ISBN-13: 978-1-58705-248-4
Pages: 408
 

Table of Contents  | Index

   Copyright
   About the Author(s)
   Acknowledgments
   Icons Used in This Book
   Command Syntax Conventions
   Introduction
    Part I:  A Network Architecture for the Virtual Enterprise
      Chapter 1.  Business Drivers Behind Enterprise Network Virtualization
      Why Virtualize?
      Business Requirements Drive Technical Requirements
      Summary
      Chapter 2.  Designing Scalable Enterprise Networks
      Hierarchical Campus Design
      Virtualizing the Campus
      WAN Design
      Summary
      Chapter 3.  A Basic Virtualized Enterprise
      The Virtual Enterprise
      Transport VirtualizationVNs
      Central Services Access: Virtual Network Perimeter
      Summary
      Chapter 4.  A Virtualization Technologies Primer: Theory
      Network Device Virtualization
      Data-Path Virtualization
      Control-Plane VirtualizationRouting Protocols
      Summary
      Chapter 5.  Infrastructure Segmentation Architectures: Theory
      Hop to Hop
      Tunnel Overlay for L3VPN
      Tunnel Overlay for Layer 2 VPNs
      Peer-Based Model for Layer 3 VPNs
      Inter-Autonomous System Connectivity: Another Application of Tunnels
      Summary
    Part II:  Enterprise Virtualization Techniques and Best Practices
      Chapter 6.  Infrastructure Segmentation Architectures: Practice
      Hop-to-Hop VLANs
      Single Address Space Solutions
      Tunnel Overlay for Layer 3 VPNs
      Layer 3 VPNs
      Layer 2 VPNs
      Summary
      Chapter 7.  Extending the Virtualized Enterprise over the WAN
      WAN Services
      Extending Segmentation over the WAN
      MPLS over Layer 2 Circuits
      Contracting Multiple IP VPNs
      Carrier Supporting Carrier (CsC)
      MPLS over GRE
      RFC 2547 VPNs over L2TPv3 Tunnels
      VRFs Interconnected by a GRE or DMVPN Overlay
      RFC 2547 VPNs over DMVPN
      Summary
      Chapter 8.  Traffic Steering and Service Centralization
      Shared Services: Protected vs. Unprotected
      Unprotected Services Access
      Protected Services Access
      Providing IP Services
      Summary
      Chapter 9.  Multicast in a Virtualized Environment
      Multicast Introduction
      VRFs and Multicast
      mVPN Transport
      Connecting the WAN
      Summary
      Chapter 10.  Quality of Service in a Virtualized Environment
      QoS Models and Mechanisms: A Review
      MPLS Quality of Service
      MPLS Traffic Engineering and Guaranteed Bandwidth
      QoS Models for Virtualized Networks
      Summary
      Chapter 11.  The Virtualized Access Layer
      Access Layer Switching
      Implementing Dynamic Authentication and Authorization
      Virtualizing the Access Layer
      Summary
    Part III:  Appendixes
      Appendix A.  L2TPv3 Expanded Coverage
      L2TPv3 Control Channel
      L2TPv3 Data Channel
      Appendix B.  MPLS QoS, Traffic Engineering, and Guaranteed Bandwidth
      MPLS QoSUniform Tunnel and Pipe Modes
      MPLS Traffic Engineering
      MPLS Fast Reroute
      Guaranteed Bandwidth
      Appendix C.  Recommended Reading
      Chapter 1
      Chapter 4
      Chapter 5
      Chapter 7
      Chapter 8
      Chapter 9
      Chapter 10
      Chapter 11
      General technology references
      Appendix D.  RFCs and Internet Drafts
      Chapter 4
      Chapter 5
      Chapter 6
      Chapter 9
      Chapter 10
      Chapter 11
   Index



Network Virtualization
Network Virtualization
ISBN: 1587052482
EAN: 2147483647
Year: 2006
Pages: 128

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net