Notes


1. This bandwidth itself is related to the frequency range of the human voice. The evolution of the telephone system is fascinating but beyond the scope of this book.

2. Frame Relay also supports a switched virtual circuit (SVC) that creates on-demand virtual circuits. This product has never been widely deployed in the United States.

3. MPLS does currently fall short compared to ATM in the ability to precisely control traffic delay and jitter as an ATM network can. MPLS, however, does offer great improvements in the provisioning of traffic engineering and quality of service in an IP network.

4. Do not go asking your service provider for this. The example is just to point out the options that are available for provisioning MPLS and do not reflect current MPLS offerings.

5. Diminishing in popularity, IPX/SPX is the network layer protocol used by the Novell operating system for best effort and reliable transportation of data on LANs.

6. One confusing element of IPSec in general is that the standards describe the ability to use AH and ESP together in the same packet. While possible, this is not widely employed and will not be further discussed here.

7. One of my colleagues likes to describe a host reading a packet using a Pac Man analogy. The Pac Man eats the bits one at a time — but always likes to know what the next meal (header) is to get psyched up for it.

8. "Pseudo-random" itself is a term that requires some explanation. Computers have a difficult time coming up with true random numbers. To indicate this for the detail oriented, the term "pseudo-random" is used to indicate a number with the "appearance" of randomness. Try using this term at your next party. It will be a big hit.




Network Perimeter Security. Building Defense In-Depth
Network Perimeter Security: Building Defense In-Depth
ISBN: 0849316286
EAN: 2147483647
Year: 2004
Pages: 119
Authors: Cliff Riggs

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net