skip to content
Layer 2 VPN architectures : pseudo-wire emulation Preview this item
ClosePreview this item

Layer 2 VPN architectures : pseudo-wire emulation

Author: Dmitry Bokotey; Safari Tech Books Online.; et al
Publisher: Indianapolis, IN : Cisco Press, 2004.
Edition/Format:   Computer file : EnglishView all editions and formats

A comprehensive guide to consolidating network infrastructures and extending VPN services. It discusses Layer 2 VPN applications utilizing both AToM and L2TPv3 protocols and compares Layer 3 versus  Read more...


(not yet rated) 0 with reviews - Be the first.

More like this


Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Material Type: Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Dmitry Bokotey; Safari Tech Books Online.; et al
OCLC Number: 873842417
Notes: Made available through: Safari Books Online, LLC.
Mode of access: World Wide Web.
Reproduction Notes: Electronic reproduction Available via World Wide Web Boston, MA : Safari.
Description: p. S. ; cm
Contents: IntroductionPart I FoundationChapter 1 Understanding Layer 2 VPNsUnderstanding Traditional VPNsLegacy Layer 2 VPNsLayer 3 VPNsChallenges of Traditional VPNsIntroducing Enhanced Layer 2 VPNsSummaryChapter 2 Pseudowire Emulation Framework and StandardsPseudowire Emulation OverviewNetwork Reference ModelProtocol Layer and System ArchitectureNative Service ProcessingPseudowire Encapsulation ProcessingTransporting over the PSNSetting Up a PseudowirePseudowire Emulation StandardizationIETF Working GroupsLayer 2 VPN Architectures on Pseudowire Emulationdraft-martinidraft-kompellaOther Layer 2 VPN ArchitecturesSummaryChapter 3 Layer 2 VPN ArchitecturesLegacy Layer 2 VPNsFrame Relay and ATMData Link SwitchingVirtual Private Dial-Up NetworkAny Transport over MPLS OverviewUsing Label Stacking in AToMLayer 2 Protocols Supported by AToMDeciding Whether to Use AToMExisting Network Installation BaseAdvanced Network ServicesInteroperabilityNetwork Operation ComplexityLayer 2 Tunnel Protocol Version 3 OverviewL2TPv3 OperationsLayer 2 Protocols Supported by L2TPv3Deciding Whether to Use L2TPv3Existing Network Installation BaseAdvanced Network ServicesInteroperabilityNetwork Operation ComplexitySummaryPart II Layer 2 Protocol PrimerChapter 4 LAN ProtocolsEthernet Background and Encapsulation OverviewMetro Ethernet OverviewMetro Ethernet Service ArchitecturesUnderstanding Spanning Tree ProtocolSpanning-Tree Operation OverviewDrawbacks of a Spanning-Tree Implementation in Today's Networks Pure Layer 2 Implementation 802.1q Tunneling 802.1q and 802.1p Tagging Understanding How 802.1q Tunneling Works 802.1q Tunneling Guidelines and Restrictions Summary Chapter 5 WAN Data-Link ProtocolsIntroducing HDLC EncapsulationIntroducing PPP EncapsulationUnderstanding Frame RelayEncapsulationFrame Relay Link Management Interface ProtocolStatus Enquiry Message FrameStatus Message FrameUpdate Status Message FrameComparing Gang of Four LMI with Annex A and Annex DManaging TrafficFrame Relay Traffic PolicingFrame Relay Traffic ShapingUnderstanding ATMEncapsulationATM Adaptation LayerATM Cell StructureATM Management Protocols: ILMI and OAMManaging TrafficATM Traffic PolicingATM Traffic ShapingSummaryPart III Any Transport over MPLSChapter 6 Understanding Any Transport over MPLSIntroducing the Label Distribution ProtocolLDP Protocol ComponentsDiscovery MechanismsLDP Basic DiscoveryLDP Extended DiscoverySession EstablishmentLabel Distribution and ManagementLabel BindingLDP Advertisement MessageLabel Advertisement ModeLabel Distribution Control ModeLabel Retention ModeLDP SecurityUnderstanding AToM OperationsPseudowire Label BindingEstablishing AToM PseudowiresControl Word NegotiationUsing Sequence NumbersPseudowire EncapsulationATMFrame RelayHDLCPPPEthernetSummaryChapter 7 LAN Protocols over MPLS Case StudiesUnderstanding Ethernet over MPLS TechnologyEoMPLS Label StackPacket FormatMTU Size RequirementsSupported VC TypesLabel ImpositionLabel DispositionEoMPLS Transport Case StudiesCase Study 7-1: Router to Router-Port BasedConfiguring Port TransparencyVerifying and Troubleshooting Port Transparency OperationCase Study 7-2: Router to Router-VLAN BasedConfiguring VLAN-Based EoMPLS on PE RoutersConfiguring VLAN-Based EoMPLS on CE RoutersVerifying and Troubleshooting the ConfigurationCase Study 7-3: VLAN RewriteCase Study 7-4: Switch to Switch-VLAN BasedConfiguring VLAN-Based EoMPLS on PEsConfiguring VLAN-Based EoMPLS on the CE SwitchesVerifying and Troubleshooting the ConfigurationCase Study 7-5: Switch to Switch-Port BasedConfiguring Port-Based EoMPLS on the SanFran SwitchConfiguring Port-Based EoMPLS on the NewYork SwitchCase Study 7-6: VLAN Rewrite in Cisco 12000 Series RoutersVerifying and Troubleshooting the ConfigurationPort VLAN ID Inconsistency IssueCase Study 7-7: Map to PseudowireCommon Troubleshooting TechniquesTroubleshooting EoMPLS on RoutersDebugging EoMPLS Operation on PE RoutersTroubleshooting EoMPLS on SwitchesSummaryChapter 8 WAN Protocols over MPLS Case StudiesSetting Up WAN over MPLS PseudowiresControl PlanePseudowire Types UsedData Plane EncapsulationUsage of the Control WordMTU RequirementsIntroducing WAN Protocols over MPLSHDLC over MPLSPPP over MPLSFrame Relay over MPLSATM over MPLSEncapsulations and Packet Format for AAL5 TransportEncapsulations and Packet Format for Cell TransportConfiguring WAN Protocols over MPLS Case StudiesCase Study 8-1: HDLC over MPLSConfiguring HDLCoMPLSVerifying HDLCoMPLSTroubleshooting HDLCoMPLSCase Study 8-2: PPP over MPLSConfiguring PPPoMPLSVerifying and Troubleshooting PPPoMPLSCase Study 8-3: Frame Relay DLCI over MPLSConfiguring Frame Relay DLCI over MPLSVerifying and Troubleshooting Frame Relay DLCI over MPLSCase Study 8-4: ATM AAL5 SDU over MPLSConfiguring AAL5oMPLSVerifying and Troubleshooting AAL5oMPLSCase Study 8-5: ATM Cell over MPLSConfiguring CRoMPLSVerifying CRoMPLSAdvanced WAN AToM Case StudiesCase Study 8-6: Decoding LDP Label Mapping and Pseudowire ID FEC ElementsCase Study 8-7: AToM Hardware CapabilitiesCase Study 8-8: Packed Cell Relay over MPLSConfiguring Cell PackingVerifying Cell Packing Configuration and OperationCase Study 8-9: Understanding Different ATM Transfer ModesAAL5 CPCS-SDU ModeSingle Cell Relay ModePacked Cell Relay ModeSummaryChapter 9 Advanced AToM Case StudiesLoad SharingCase Study 9-1: Unequal-Cost MultipathCase Study 9-2: Equal-Cost MultipathPreferred PathCase Study 9-3: Configuring Preferred Path Using IP RoutingCase Study 9-4: Configuring a Preferred Path Using MPLS Traffic Engineering TunnelsCase Study 9-5: Protecting AToM Pseudowires with MPLS Traffic Engineering Fast RerouteCase Study 9-6: Configuring AToM Pseudowire over GRE TunnelPseudowire Emulation in Multi-AS NetworksCase Study 9-7: Interconnecting Pseudowires with Dedicated CircuitsCase Study 9-8: BGP IPv4 Label Distribution with IGP RedistributionCase Study 9-9: BGP IPv4 Label Distribution with IBGP PeeringCase Study 9-10: Configuring LDP Authentication for Pseudowire SignalingVerifying Pseudowire Data ConnectivityCase Study 9-11: Advertising the VCCV CapabilityCase Study 9-12: Verifying Data Plane ConnectivityQuality of Service in AToMCase Study 9-13: Traffic MarkingCase Study 9-14: Traffic PolicingCase Study 9-15: Queuing and ShapingCase Study 9-16: Intermediate MarkingsCase Study 9-17: Layer 2-Specific Matching and SettingEthernet over MPLS QoSFrame Relay over MPLS QoSATM over MPLS QoSSummaryPart IV Layer 2 Tunneling Protocol Version 3Chapter 10 Understanding L2TPv3Universal Transport Interface: L2TPv3's PredecessorIntroducing L2TPv3L2TPv3 Data EncapsulationPacket-Switched Network LayerDemultiplexing SublayerEncapsulation SublayerL2TPv3 Control ConnectionControl Message EncapsulationL2TPv3 Control Channel SignalingSummaryChapter 11 LAN Protocols over L2TPv3 Case StudiesIntroducing the L2TPv3 Configuration Syntaxxconnect Command Syntaxpseudowire-class Command Syntaxl2tp-class Command SyntaxLAN Protocols over L2TPv3 Case StudiesCase Study 11-1: Ethernet Port-to-Port Manual SessionEthernet Port-to-Port Manual ConfigurationVerifying Ethernet Port-to-Port Manual SessionEthernet Port-to-Port L2TPv3 Data Plane DetailsCase Study 11-2: Ethernet Port-to-Port Manual Session with KeepaliveEthernet Port-to-Port Manual Session with Keepalive ConfigurationEthernet Port-to-Port Manual Session with Keepalive VerificationEthernet Port-to-Port Manual Session with Keepalive Control Plane DetailsCase Study 11-3: Ethernet Port-to-Port Dynamic SessionEthernet Port-to-Port Dynamic ConfigurationEthernet Port-to-Port Dynamic Session VerificationEthernet Port-to-Port Dynamic Session Control Plane DetailsCase Study 11-4: Ethernet VLAN-to-VLAN Dynamic SessionEthernet VLAN-to-VLAN Dynamic ConfigurationEthernet VLAN-to-VLAN Dynamic Session VerificationEthernet VLAN-to-VLAN Dynamic Session Control Plane DetailsEthernet VLAN-to-VLAN Frame EncapsulationSummaryChapter 12 WAN Protocols over L2TPv3 Case StudiesWAN Protocols over L2TPv3 Technology OverviewControl PlaneData PlaneUsing the Layer 2-Specific SublayerMTU ConsiderationsHDLC and PPP over L2TPv3Frame Relay over L2TPv3ATM over L2TPv3Configuring WAN Protocols over L2TPv3 Case StudiesCase Study 12-1: HDLC over L2TPv3 with Static SessionConfiguring HDLCoL2TPv3Verifying HDLCoL2TPv3Data Plane DetailsCase Study 12-2: PPP over L2TPv3 with Dynamic SessionConfiguring PPPoL2TPv3Verifying PPPoL2TPv3Control Plane NegotiationData Plane DetailsCase Study 12-3: Frame Relay DLCI over L2TPv3 with Dynamic SessionConfiguring FRoL2TPv3Verifying FRoL2TPv3Data Plane DetailsCase Study 12-4: AAL5 SDU over L2TPv3 with Dynamic SessionConfiguring AAL5_SDUoL2TPv3 with Dynamic SessionVerifying AAL5_SDUoL2TPv3Control Plane DetailsData Plane DetailsCase Study 12-5: ATM Cell Relay over L2TPv3 with Dynamic SessionConfiguring ATM_CRoL2TPv3 with Dynamic SessionVerifying ATM_CRoL2TPv3Cell Relay DetailsSummaryChapter 13 Advanced L2TPv3 Case StudiesCase Study 13-1: L2TPv3 Path MTU DiscoveryThe Problem: MTU and Fragmentation with L2TPv3The Solution: Path MTU DiscoveryUnderstanding PMTUDImplementing PMTUDCombining PMTUD with DF BitAdvanced ATM Transport over L2TPv3Case Study 13-2: ATM OAM EmulationCase Study 13-3: ATM Cell PackingQuality of ServiceCase Study 13-4: Traffic MarkingToS SettingToS ReflectionMQC IP Precedence or DSCP SettingCase Study 13-5: Traffic PolicingCase Study 13-6: Queuing and ShapingCase Study 13-7: Layer 2-Specific Matching and SettingSummaryPart V Additional Layer 2 VPN ArchitecturesChapter 14 Layer 2 Interworking and Local SwitchingLayer 2 Interworking Technology OverviewBridged InterworkingRouted InterworkingInterworking MTU ConsiderationsLayer 2 Interworking Case StudiesEthernet (Bridged) Interworking Case StudiesCase Study 14-1: Ethernet-to-VLAN Using AToMCase Study 14-2: Ethernet-to-VLAN Using L2TPv3Case Study 14-3: ATM AAL5-to-VLAN Using AToMEthernet-VLAN IW Switch Environment ConsiderationsRouted InterworkingCase Study 14-4: Frame Relay-to-VLAN Using AToMCase Study 14-5: Frame Relay-to-PPP Using L2TPv3Case Study 14-6: IP L2-Transport MTU ConsiderationsCase Study 14-7: Frame Relay-to-ATM Interworking Best PracticesLayer 2 Local SwitchingCase Study 14-8: Frame Relay-to-Frame Relay Local SwitchingCase Study 14-9: ATM-to-ATM Local SwitchingCase Study 14-10: Ethernet-to-Ethernet Local SwitchingLayer 2 Local Switching with InterworkingCase Study 14-11: Ethernet-to-VLAN Local SwitchingCase Study 14-12: ATM Attachment Circuits and Local SwitchingUnderstanding Advanced Interworking and Local Switchingconnect CommandEncapsulationEncapsulation 1: Ethernet-to-VLAN Local Switching Ethernet IWEncapsulation 2: Frame Relay-to-VLAN IP IW Using AToMEncapsulation 3: VLAN-to-Ethernet Bridged IW Using L2TPv3Encapsulation 4: Frame Relay-to-PPP IP-IW Using L2TPv3SummaryChapter 15 Virtual Private LAN ServiceUnderstanding VPLS FundamentalsService DefinitionsVirtual SwitchVPLS Forwarding and FloodingVPLS SignalingVPLS Deployment ModelsBasic Topologic ModelsFull MeshHub and SpokePartial MeshHierarchical VPLSHierarchical VPLS with MPLS Access NetworkHierarchical VPLS with QinQ Access NetworkVPLS RedundancyVPLS Configuration Case StudiesCase Study 15-1: Basic ConfigurationConfiguring Attachment CircuitConfiguring VFIAssociating Attachment Circuits to the VFIConfiguration ExampleCase Study 15-2: Per-VLAN MAC Address LimitingCase Study 15-3: Quality of ServiceCase Study 15-4: Layer 2 Protocol TunnelingCase Study 15-5: MultihomingSummaryAppendix L2TPv3 AVP Attribute TypesIndex
Responsibility: Dmitry Bokotey ... [et al.].


User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...


Be the first.

Similar Items

Related Subjects:(1)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data

Primary Entity

<> # Layer 2 VPN architectures pseudo-wire emulation
    a schema:CreativeWork, bgn:ComputerFile ;
   library:oclcnum "873842417" ;
   library:placeOfPublication <> ; # Indianapolis, IN
   library:placeOfPublication <> ;
   schema:about <> ; # Electronic books / local
   schema:contributor <> ; # Safari Tech Books Online.
   schema:creator <> ; # Dmitry Bokotey
   schema:datePublished "2004" ;
   schema:exampleOfWork <> ;
   schema:inLanguage "en" ;
   schema:isSimilarTo <> ;
   schema:name "Layer 2 VPN architectures pseudo-wire emulation" ;
   schema:productID "873842417" ;
   schema:publication <> ;
   schema:publisher <> ; # Cisco Press
   schema:url <> ;
   schema:url <> ;
   wdrs:describedby <> ;

Related Entities

<> # Safari Tech Books Online.
    a schema:Organization ;
   schema:name "Safari Tech Books Online." ;

<> # Dmitry Bokotey
    a schema:Person ;
   schema:familyName "Bokotey" ;
   schema:givenName "Dmitry" ;
   schema:name "Dmitry Bokotey" ;

<> # Indianapolis, IN
    a schema:Place ;
   schema:name "Indianapolis, IN" ;

<> # Electronic books / local
    a schema:Thing ;
   schema:name "Electronic books / local" ;

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.