|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn670429339 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
101018s2005 inua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d IDEBK
|d CEF
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d YDX
|d OCLCQ
|d AU@
|d OCLCQ
|d UKAHL
|d OCLCO
|d FZL
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 667109750
|a 1351592853
|
020 |
|
|
|a 9780132492485
|
020 |
|
|
|a 0132492482
|
020 |
|
|
|a 1587058480
|
020 |
|
|
|a 9781587058486
|
020 |
|
|
|z 9781587058486
|
024 |
8 |
|
|a 9780132492485
|
029 |
1 |
|
|a DEBSZ
|b 355399938
|
029 |
1 |
|
|a GBVCP
|b 785424296
|
029 |
1 |
|
|a HEBIS
|b 291472982
|
035 |
|
|
|a (OCoLC)670429339
|z (OCoLC)667109750
|z (OCoLC)1351592853
|
037 |
|
|
|a CL0500000075
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.875.E87
|b L393 2005
|
082 |
0 |
4 |
|a 004.6
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Layer 2 VPN architectures /
|c Wei Luo [and others].
|
246 |
3 |
|
|a Layer two virtual private network architectures
|
260 |
|
|
|a Indianapolis, Ind. :
|b Cisco Press,
|c ©2005.
|
300 |
|
|
|a 1 online resource (xxiii, 623 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
347 |
|
|
|a text file
|2 rda
|
490 |
1 |
|
|a Networking technology series
|
520 |
|
|
|a "Layer 2 VPN Architectures is a comprehensive guide to consolidating network infrastructures and extending VPN services. The book opens by discussing Layer 2 VPN applications utilizing both AToM and L2TPv3 protocols and comparing Layer 3 versus Layer 2 provider-provisioned VPNs. In addition to describing the concepts related to Layer 2 VPNs, this book provides an extensive collection of case studies that show you how these technologies and architectures work. The case studies include both AToM and L2TPv3 and reveal real-world service provider and enterprise design problems and solutions with hands-on configuration examples and implementation details. The case studies include all Layer 2 technologies transported using AToM and L2TPv3 pseudowires, including Ethernet, Ethernet VLAN, HDLC, PPP, Frame Relay, ATM AAL5 and ATM cells, and advanced topics relevant to Layer 2 VPN deployment, such as QoS and scalability"--Resource description page.
|
588 |
0 |
|
|a Print version record.
|
542 |
|
|
|f Copyright© 2005 Cisco Systems, Inc.
|g 2005
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Extranets (Computer networks)
|
650 |
|
6 |
|a Extranets.
|
650 |
|
7 |
|a Extranets (Computer networks)
|2 blmlsh
|
650 |
|
7 |
|a Extranets (Computer networks)
|2 fast
|
700 |
1 |
|
|a Luo, Wei.
|
776 |
0 |
8 |
|i Print version:
|t Layer 2 VPN architectures.
|d Indianapolis, Ind. : Cisco Press, 2005
|z 9781587058486
|w (DLC) 2003109688
|w (OCoLC)457503758
|
830 |
|
0 |
|a Cisco Press networking technology series.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780132492485/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37819857
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH38082089
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 263874
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14851102
|
994 |
|
|
|a 92
|b IZTAP
|