Buy Layer 2 VPN Architectures by Anthony Chan at Bookstore UAE
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer networking and communications > Layer 2 VPN Architectures
Layer 2 VPN Architectures

Layer 2 VPN Architectures


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

A complete guide to understanding, designing, and deploying Layer 2 VPN technologies and pseudowire emulation applications Evaluate market drivers for Layer 2 VPNs Understand the architectural frame-work and choices for Layer 2 VPNs, including AToM and L2TPv3 Grasp the essentials of Layer 2 LAN and WAN technologies Examine the theoretical and operational details of MPLS and LDP as they pertain to AToM Understand the theoretical and operational details of Layer 2 protocols over L2TPv3 in IP networks Learn about Layer 2 VPN bridged and routed interworking and Layer 2 local switching Understand the operation and application of Virtual Private LAN Services (VPLS) Learn about foundation and advanced AToM and L2TPv3 topics through an extensive collection of case studies The historical disconnect between legacy Layer 2 and Layer 3 VPN solutions has forced service providers to build, operate, and maintain separate infrastructures to accommodate various VPN access technologies. This costly proposition, however, is no longer necessary. As part of its new Unified VPN Suite, Cisco Systems now offers next-generation Layer 2 VPN services like Layer 2 Tunneling Protocol version 3 (L2TPv3) and Any Transport over MPLS (AToM) that enable service providers to offer Frame Relay, ATM, Ethernet, and leased-line services over a common IP/MPLS core network. By unifying multiple network layers and providing an integrated set of software services and management tools over this infrastructure, the Cisco Layer 2 VPN solution enables established carriers, IP-oriented ISP/CLECs, and large enterprise customers (LECs) to reach a broader set of potential VPN customers and offer truly global VPNs. Layer 2 VPN Architectures is a comprehensive guide to consolidating network infrastruc-tures and extending VPN services. The book opens by discussing Layer 2 VPN applications utilizing both AToM and L2TPv3 protocols and comparing Layer 3 versus Layer 2 provider-provisioned VPNs. In addition to describing the concepts related to Layer 2 VPNs, this book provides an extensive collection of case studies that show you how these technologies and architectures work. The case studies include both AToM and L2TPv3 and reveal real-world service provider and enterprise design problems and solutions with hands-on configuration examples and implementation details. The case studies include all Layer 2 technologies transported using AToM and L2TPv3 pseudowires, including Ethernet, Ethernet VLAN, HDLC, PPP, Frame Relay, ATM AAL5 and ATM cells, and advanced topics relevant to Layer 2 VPN deployment, such as QoS and scalability. Layer 2 VPN Architectures is your practical guide to understanding, designing, and deploying Layer 2 VPNs. Wei Luo, CCIE No. 13,291, is a technical leader for Cisco Systems. He is the principle designer and developer for Cisco Layer 2 VPN products including AToM and VPLS. Wei actively participates in IETF standarization processes. Carlos Pignataro, CCIE No. 4619, is a senior engineer in the Escalation Team for Cisco Systems. In this role he is responsible for handling difficult and complex escalations, working on critical or stalled software defects, and participating in the new product and development process. Dmitry Bokotey, CCIE No. 4460, holds a quadruple CCIE title in the fields of Routing and Switching, ISP Dial, Security, and Service Provider. He is a network consulting engineer with the Central Engineering and Metro Ethernet team of Cisco Systems. Anthony Chan, CCIE No. 10,266, is a network consulting engineer for the Cisco System Advanced Services Central Engineering organization. Anthony participates in MPLS and routing technology teams, which provide focused design and proactive support to service provider and enterprise customers. Includes a FREE 45-Day Online Edition This book is part of the Networking Technology Series from Cisco Press , which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Table of Contents:
Introduction Part I   Foundation Chapter 1   Understanding Layer 2 VPNs Understanding Traditional VPNs Legacy Layer 2 VPNs Layer 3 VPNs Challenges of Traditional VPNs Introducing Enhanced Layer 2 VPNs Summary Chapter 2   Pseudowire Emulation Framework and Standards Pseudowire Emulation Overview Network Reference Model Protocol Layer and System Architecture Native Service Processing Pseudowire Encapsulation Processing Transporting over the PSN Setting Up a Pseudowire Pseudowire Emulation Standardization IETF Working Groups Layer 2 VPN Architectures on Pseudowire Emulation draft-martini draft-kompella Other Layer 2 VPN Architectures Summary Chapter 3   Layer 2 VPN Architectures Legacy Layer 2 VPNs Frame Relay and ATM Data Link Switching Virtual Private Dial-Up Network Any Transport over MPLS Overview Using Label Stacking in AToM Layer 2 Protocols Supported by AToM Deciding Whether to Use AToM Existing Network Installation Base Advanced Network Services Interoperability Network Operation Complexity Layer 2 Tunnel Protocol Version 3 Overview L2TPv3 Operations Layer 2 Protocols Supported by L2TPv3 Deciding Whether to Use L2TPv3 Existing Network Installation Base Advanced Network Services Interoperability Network Operation Complexity Summary Part II   Layer 2 Protocol Primer Chapter 4   LAN Protocols Ethernet Background and Encapsulation Overview Metro Ethernet Overview Metro Ethernet Service Architectures Understanding Spanning Tree Protocol Spanning-Tree Operation Overview Drawbacks of a Spanning-Tree Implementation in Today’s Networks Pure Layer 2 Implementation 802.1q Tunneling 802.1q and 802.1p Tagging Understanding How 802.1q Tunneling Works 802.1q Tunneling Guidelines and Restrictions Summary Chapter 5   WAN Data-Link Protocols Introducing HDLC Encapsulation Introducing PPP Encapsulation Understanding Frame Relay Encapsulation Frame Relay Link Management Interface Protocol Status Enquiry Message Frame Status Message Frame Update Status Message Frame Comparing Gang of Four LMI with Annex A and Annex D Managing Traffic Frame Relay Traffic Policing Frame Relay Traffic Shaping Understanding ATM Encapsulation ATM Adaptation Layer ATM Cell Structure ATM Management Protocols: ILMI and OAM Managing Traffic ATM Traffic Policing ATM Traffic Shaping Summary Part III  Any Transport over MPLS Chapter 6   Understanding Any Transport over MPLS Introducing the Label Distribution Protocol LDP Protocol Components Discovery Mechanisms LDP Basic Discovery LDP Extended Discovery Session Establishment Label Distribution and Management Label Binding LDP Advertisement Message Label Advertisement Mode Label Distribution Control Mode Label Retention Mode LDP Security Understanding AToM Operations Pseudowire Label Binding Establishing AToM Pseudowires Control Word Negotiation Using Sequence Numbers Pseudowire Encapsulation ATM Frame Relay HDLC PPP Ethernet Summary Chapter 7   LAN Protocols over MPLS Case Studies Understanding Ethernet over MPLS Technology EoMPLS Label Stack Packet Format MTU Size Requirements Supported VC Types Label Imposition Label Disposition EoMPLS Transport Case Studies Case Study 7-1: Router to Router—Port Based Configuring Port Transparency Verifying and Troubleshooting Port Transparency Operation Case Study 7-2: Router to Router—VLAN Based Configuring VLAN-Based EoMPLS on PE Routers Configuring VLAN-Based EoMPLS on CE Routers Verifying and Troubleshooting the Configuration Case Study 7-3: VLAN Rewrite Case Study 7-4: Switch to Switch—VLAN Based Configuring VLAN-Based EoMPLS on PEs Configuring VLAN-Based EoMPLS on the CE Switches Verifying and Troubleshooting the Configuration Case Study 7-5: Switch to Switch—Port Based Configuring Port-Based EoMPLS on the SanFran Switch Configuring Port-Based EoMPLS on the NewYork Switch Case Study 7-6: VLAN Rewrite in Cisco 12000 Series Routers Verifying and Troubleshooting the Configuration Port VLAN ID Inconsistency Issue Case Study 7-7: Map to Pseudowire Common Troubleshooting Techniques Troubleshooting EoMPLS on Routers Debugging EoMPLS Operation on PE Routers Troubleshooting EoMPLS on Switches Summary Chapter 8   WAN Protocols over MPLS Case Studies Setting Up WAN over MPLS Pseudowires Control Plane Pseudowire Types Used Data Plane Encapsulation Usage of the Control Word MTU Requirements Introducing WAN Protocols over MPLS HDLC over MPLS PPP over MPLS Frame Relay over MPLS ATM over MPLS Encapsulations and Packet Format for AAL5 Transport Encapsulations and Packet Format for Cell Transport Configuring WAN Protocols over MPLS Case Studies Case Study 8-1: HDLC over MPLS Configuring HDLCoMPLS Verifying HDLCoMPLS Troubleshooting HDLCoMPLS Case Study 8-2: PPP over MPLS Configuring PPPoMPLS Verifying and Troubleshooting PPPoMPLS Case Study 8-3: Frame Relay DLCI over MPLS Configuring Frame Relay DLCI over MPLS Verifying and Troubleshooting Frame Relay DLCI over MPLS Case Study 8-4: ATM AAL5 SDU over MPLS Configuring AAL5oMPLS Verifying and Troubleshooting AAL5oMPLS Case Study 8-5: ATM Cell over MPLS Configuring CRoMPLS Verifying CRoMPLS Advanced WAN AToM Case Studies Case Study 8-6: Decoding LDP Label Mapping and Pseudowire ID FEC Elements Case Study 8-7: AToM Hardware Capabilities Case Study 8-8: Packed Cell Relay over MPLS Configuring Cell Packing Verifying Cell Packing Configuration and Operation Case Study 8-9: Understanding Different ATM Transfer Modes AAL5 CPCS-SDU Mode Single Cell Relay Mode Packed Cell Relay Mode Summary Chapter 9   Advanced AToM Case Studies Load Sharing Case Study 9-1: Unequal-Cost Multipath Case Study 9-2: Equal-Cost Multipath Preferred Path Case Study 9-3: Configuring Preferred Path Using IP Routing Case Study 9-4: Configuring a Preferred Path Using MPLS Traffic Engineering Tunnels Case Study 9-5: Protecting AToM Pseudowires with MPLS Traffic Engineering Fast Reroute Case Study 9-6: Configuring AToM Pseudowire over  GRE Tunnel Pseudowire Emulation in Multi-AS Networks Case Study 9-7: Interconnecting Pseudowires with Dedicated Circuits Case Study 9-8: BGP IPv4 Label Distribution with IGP Redistribution Case Study 9-9: BGP IPv4 Label Distribution with IBGP Peering Case Study 9-10: Configuring LDP Authentication for Pseudowire Signaling Verifying Pseudowire Data Connectivity Case Study 9-11: Advertising the VCCV Capability Case Study 9-12: Verifying Data Plane Connectivity Quality of Service in AToM Case Study 9-13: Traffic Marking Case Study 9-14: Traffic Policing Case Study 9-15: Queuing and Shaping Case Study 9-16: Intermediate Markings Case Study 9-17: Layer 2–Specific Matching and Setting Ethernet over MPLS QoS Frame Relay over MPLS QoS ATM over MPLS QoS Summary Part IV Layer 2 Tunneling Protocol Version 3 Chapter 10   Understanding L2TPv3 Universal Transport Interface: L2TPv3’s Predecessor Introducing L2TPv3 L2TPv3 Data Encapsulation Packet-Switched Network Layer Demultiplexing Sublayer Encapsulation Sublayer L2TPv3 Control Connection Control Message Encapsulation L2TPv3 Control Channel Signaling Summary Chapter 11   LAN Protocols over L2TPv3 Case Studies Introducing the L2TPv3 Configuration Syntax xconnect Command Syntax pseudowire-class Command Syntax l2tp-class Command Syntax LAN Protocols over L2TPv3 Case Studies Case Study 11-1: Ethernet Port-to-Port Manual Session Ethernet Port-to-Port Manual Configuration Verifying Ethernet Port-to-Port Manual Session Ethernet Port-to-Port L2TPv3 Data Plane Details Case Study 11-2: Ethernet Port-to-Port Manual Session with Keepalive Ethernet Port-to-Port Manual Session with Keepalive Configuration Ethernet Port-to-Port Manual Session with Keepalive Verification Ethernet Port-to-Port Manual Session with Keepalive Control Plane Details Case Study 11-3: Ethernet Port-to-Port Dynamic Session Ethernet Port-to-Port Dynamic Configuration Ethernet Port-to-Port Dynamic Session Verification Ethernet Port-to-Port Dynamic Session Control Plane Details Case Study 11-4: Ethernet VLAN-to-VLAN Dynamic Session Ethernet VLAN-to-VLAN Dynamic Configuration Ethernet VLAN-to-VLAN Dynamic Session Verification Ethernet VLAN-to-VLAN Dynamic Session Control Plane Details Ethernet VLAN-to-VLAN Frame Encapsulation Summary Chapter 12   WAN Protocols over L2TPv3 Case Studies WAN Protocols over L2TPv3 Technology Overview Control Plane Data Plane Using the Layer 2-Specific Sublayer MTU Considerations HDLC and PPP over L2TPv3 Frame Relay over L2TPv3 ATM over L2TPv3 Configuring WAN Protocols over L2TPv3 Case Studies Case Study 12-1: HDLC over L2TPv3 with Static Session Configuring HDLCoL2TPv3 Verifying HDLCoL2TPv3 Data Plane Details Case Study 12-2: PPP over L2TPv3 with Dynamic Session Configuring PPPoL2TPv3 Verifying PPPoL2TPv3 Control Plane Negotiation Data Plane Details Case Study 12-3: Frame Relay DLCI over L2TPv3 with Dynamic Session Configuring FRoL2TPv3 Verifying FRoL2TPv3 Data Plane Details Case Study 12-4: AAL5 SDU over L2TPv3 with Dynamic Session Configuring AAL5_SDUoL2TPv3 with Dynamic Session Verifying AAL5_SDUoL2TPv3 Control Plane Details Data Plane Details Case Study 12-5: ATM Cell Relay over L2TPv3 with Dynamic Session Configuring ATM_CRoL2TPv3 with Dynamic Session Verifying ATM_CRoL2TPv3 Cell Relay Details Summary Chapter 13   Advanced L2TPv3 Case Studies Case Study 13-1: L2TPv3 Path MTU Discovery The Problem: MTU and Fragmentation with L2TPv3 The Solution: Path MTU Discovery Understanding PMTUD Implementing PMTUD Combining PMTUD with DF Bit Advanced ATM Transport over L2TPv3 Case Study 13-2: ATM OAM Emulation Case Study 13-3: ATM Cell Packing Quality of Service Case Study 13-4: Traffic Marking ToS Setting ToS Reflection MQC IP Precedence or DSCP Setting Case Study 13-5: Traffic Policing Case Study 13-6: Queuing and Shaping Case Study 13-7: Layer 2-Specific Matching and Setting Summary Part V   Additional Layer 2 VPN Architectures Chapter 14   Layer 2 Interworking and Local Switching Layer 2 Interworking Technology Overview Bridged Interworking Routed Interworking Interworking MTU Considerations Layer 2 Interworking Case Studies Ethernet (Bridged) Interworking Case Studies Case Study 14-1: Ethernet-to-VLAN Using AToM Case Study 14-2: Ethernet-to-VLAN Using L2TPv3 Case Study 14-3: ATM AAL5-to-VLAN Using AToM Ethernet-VLAN IW Switch Environment Considerations Routed Interworking Case Study 14-4: Frame Relay-to-VLAN Using AToM Case Study 14-5: Frame Relay-to-PPP Using L2TPv3 Case Study 14-6: IP L2-Transport MTU Considerations Case Study 14-7: Frame Relay-to-ATM Interworking Best Practices Layer 2 Local Switching Case Study 14-8: Frame Relay-to-Frame Relay Local Switching Case Study 14-9: ATM-to-ATM Local Switching Case Study 14-10: Ethernet-to-Ethernet Local Switching Layer 2 Local Switching with Interworking Case Study 14-11: Ethernet-to-VLAN Local Switching Case Study 14-12: ATM Attachment Circuits and Local Switching Understanding Advanced Interworking and Local Switching connect Command Encapsulation Encapsulation 1: Ethernet-to-VLAN Local Switching Ethernet IW Encapsulation 2: Frame Relay-to-VLAN IP IW Using AToM Encapsulation 3: VLAN-to-Ethernet Bridged IW Using L2TPv3 Encapsulation 4: Frame Relay-to-PPP IP-IW Using L2TPv3 Summary Chapter 15   Virtual Private LAN Service Understanding VPLS Fundamentals Service Definitions Virtual Switch VPLS Forwarding and Flooding VPLS Signaling VPLS Deployment Models Basic Topologic Models Full Mesh Hub and Spoke Partial Mesh Hierarchical VPLS Hierarchical VPLS with MPLS Access Network Hierarchical VPLS with QinQ Access Network VPLS Redundancy VPLS Configuration Case Studies Case Study 15-1: Basic Configuration Configuring Attachment Circuit Configuring VFI Associating Attachment Circuits to the VFI Configuration Example Case Study 15-2: Per-VLAN MAC Address Limiting Case Study 15-3: Quality of Service Case Study 15-4: Layer 2 Protocol Tunneling Case Study 15-5: Multihoming Summary Appendix    L2TPv3 AVP Attribute Types Index  

About the Author :
Wei Luo, CCIE No. 13,291, is a technical leader for Cisco Systems. He is the principle designer and developer for Cisco Layer 2 VPN products including AToM and VPLS. Wei actively participates in IETF standarization processes.   Carlos Pignataro, CCIE No. 4619, is a senior engineer in the Escalation Team for Cisco Systems. In this role he is responsible for handling difficult and complex escalations, working on critical or stalled software defects, and participating in the new product and development process.   Dmitry Bokotey, CCIE No. 4460, holds a quadruple CCIE title in the fields of Routing and Switching, ISP Dial, Security, and Service Provider. He is a network consulting engineer with the Central Engineering and Metro Ethernet team of Cisco Systems.   Anthony Chan, CCIE No. 10,266, is a network consulting engineer for the Cisco System Advanced Services Central Engineering organization. Anthony participates in MPLS and routing technology teams, which provide focused design and proactive support to service provider and enterprise customers.  


Best Sellers


Product Details
  • ISBN-13: 9781587051685
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Language: English
  • Spine Width: 43 mm
  • Width: 240 mm
  • ISBN-10: 1587051680
  • Publisher Date: 24 Mar 2005
  • Binding: Hardback
  • No of Pages: 648
  • Weight: 1243 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Layer 2 VPN Architectures
Pearson Education (US) -
Layer 2 VPN Architectures
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Layer 2 VPN Architectures

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!