Flylib.com
Network Virtualization
Network Virtualization
ISBN: 1587052482
EAN: 2147483647
Year: 2006
Pages: 128
Authors:
Victor Moreno
,
Kumar Reddy
BUY ON AMAZON
Network Virtualization
Table of Contents
Copyright
About the Author(s)
Acknowledgments
Icons Used in This Book
Command Syntax Conventions
Introduction
Part I: A Network Architecture for the Virtual Enterprise
Chapter 1. Business Drivers Behind Enterprise Network Virtualization
Why Virtualize?
Business Requirements Drive Technical Requirements
Summary
Chapter 2. Designing Scalable Enterprise Networks
Hierarchical Campus Design
Virtualizing the Campus
WAN Design
Summary
Chapter 3. A Basic Virtualized Enterprise
The Virtual Enterprise
Transport VirtualizationVNs
Central Services Access: Virtual Network Perimeter
Summary
Chapter 4. A Virtualization Technologies Primer: Theory
Network Device Virtualization
Data-Path Virtualization
Control-Plane VirtualizationRouting Protocols
Summary
Chapter 5. Infrastructure Segmentation Architectures: Theory
Hop to Hop
Tunnel Overlay for L3VPN
Tunnel Overlay for Layer 2 VPNs
Peer-Based Model for Layer 3 VPNs
Inter-Autonomous System Connectivity: Another Application of Tunnels
Summary
Part II: Enterprise Virtualization Techniques and Best Practices
Chapter 6. Infrastructure Segmentation Architectures: Practice
Hop-to-Hop VLANs
Single Address Space Solutions
Tunnel Overlay for Layer 3 VPNs
Layer 3 VPNs
Layer 2 VPNs
Summary
Chapter 7. Extending the Virtualized Enterprise over the WAN
WAN Services
Extending Segmentation over the WAN
MPLS over Layer 2 Circuits
Contracting Multiple IP VPNs
Carrier Supporting Carrier (CsC)
MPLS over GRE
RFC 2547 VPNs over L2TPv3 Tunnels
VRFs Interconnected by a GRE or DMVPN Overlay
RFC 2547 VPNs over DMVPN
Summary
Chapter 8. Traffic Steering and Service Centralization
Shared Services: Protected vs. Unprotected
Unprotected Services Access
Protected Services Access
Providing IP Services
Summary
Chapter 9. Multicast in a Virtualized Environment
Multicast Introduction
VRFs and Multicast
mVPN Transport
Connecting the WAN
Summary
Chapter 10. Quality of Service in a Virtualized Environment
QoS Models and Mechanisms: A Review
MPLS Quality of Service
MPLS Traffic Engineering and Guaranteed Bandwidth
QoS Models for Virtualized Networks
Summary
Chapter 11. The Virtualized Access Layer
Access Layer Switching
Implementing Dynamic Authentication and Authorization
Virtualizing the Access Layer
Summary
Part III: Appendixes
Appendix A. L2TPv3 Expanded Coverage
L2TPv3 Control Channel
L2TPv3 Data Channel
Appendix B. MPLS QoS, Traffic Engineering, and Guaranteed Bandwidth
MPLS QoSUniform Tunnel and Pipe Modes
MPLS Traffic Engineering
MPLS Fast Reroute
Guaranteed Bandwidth
Appendix C. Recommended Reading
Chapter 1
Chapter 4
Chapter 5
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
General technology references
Appendix D. RFCs and Internet Drafts
Chapter 4
Chapter 5
Chapter 6
Chapter 9
Chapter 10
Chapter 11
Index
SYMBOL
A
B
C
D
E
F
G
H
I
L
M
N
O
P
Q
R
S
T
U
V
W
X
Network Virtualization
ISBN: 1587052482
EAN: 2147483647
Year: 2006
Pages: 128
Authors:
Victor Moreno
,
Kumar Reddy
BUY ON AMAZON
Similar book on Amazon
CompTIA Project+ Study Guide: Exam PK0-003
Cisco Unified Computing System (UCS) (Data Center): A Complete Reference Guide to the Cisco Data Center Virtualization Server Architecture (Networking Technology)
Cloud Computing: Automating the Virtualized Data Center (Networking Technology)
I/O Consolidation in the Data Center
NX-OS and Cisco Nexus Switching: Next-Generation Data Center Architectures (Networking Technology)
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
Measuring ROI in E-Commerce Applications: Analysis to Action
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Governing Information Technology Through COBIT
SQL Hacks
Hack 1. Run SQL from the Command Line
Hack 23. Second Tuesday of the Month
Locking and Performance
Hack 71. Extract Lots of Rows
Hack 83. Find the Top n in Each Group
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Getting Help
Exploring Exponential and Logarithmic Functions
Dealing with Complex Numbers
Introduction
Getting More Realistic Results with Integer Constraints
Visual C# 2005 How to Program (2nd Edition)
Passing Arrays and Array Elements to Methods
Variable-Length Argument Lists
GroupBoxes and Panels
Searching Algorithms
Wrap-Up
Twisted Network Programming Essentials
Responding to HTTP Requests
Using Authentication in a Twisted Server
Using Authentication with Perspective Broker
Mail Clients
Setting Limits on an Applications Permissions
Comparing, Designing, and Deploying VPNs
Configuring and Verifying L2TPv3 Pseudowires
Benefits and Drawbacks of AToM-Based L2VPNs
Deploying Site-to-Site IPsec VPNs
Scaling IPsec Virtual Private Networks
Understanding IKE in an IPsec Remote Access VPN Environment
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies