Cargando…

Layer 2 VPN architectures /

"Layer 2 VPN Architectures is a comprehensive guide to consolidating network infrastructures and extending VPN services. The book opens by discussing Layer 2 VPN applications utilizing both AToM and L2TPv3 protocols and comparing Layer 3 versus Layer 2 provider-provisioned VPNs. In addition to...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Luo, Wei
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, Ind. : Cisco Press, ©2005.
Colección:Cisco Press networking technology series.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn670429339
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 101018s2005 inua o 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d IDEBK  |d CEF  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d YDX  |d OCLCQ  |d AU@  |d OCLCQ  |d UKAHL  |d OCLCO  |d FZL  |d OCLCQ  |d OCLCO 
019 |a 667109750  |a 1351592853 
020 |a 9780132492485 
020 |a 0132492482 
020 |a 1587058480 
020 |a 9781587058486 
020 |z 9781587058486 
024 8 |a 9780132492485 
029 1 |a DEBSZ  |b 355399938 
029 1 |a GBVCP  |b 785424296 
029 1 |a HEBIS  |b 291472982 
035 |a (OCoLC)670429339  |z (OCoLC)667109750  |z (OCoLC)1351592853 
037 |a CL0500000075  |b Safari Books Online 
050 4 |a TK5105.875.E87  |b L393 2005 
082 0 4 |a 004.6  |2 22 
049 |a UAMI 
245 0 0 |a Layer 2 VPN architectures /  |c Wei Luo [and others]. 
246 3 |a Layer two virtual private network architectures 
260 |a Indianapolis, Ind. :  |b Cisco Press,  |c ©2005. 
300 |a 1 online resource (xxiii, 623 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |a text file  |2 rda 
490 1 |a Networking technology series 
520 |a "Layer 2 VPN Architectures is a comprehensive guide to consolidating network infrastructures and extending VPN services. The book opens by discussing Layer 2 VPN applications utilizing both AToM and L2TPv3 protocols and comparing Layer 3 versus Layer 2 provider-provisioned VPNs. In addition to describing the concepts related to Layer 2 VPNs, this book provides an extensive collection of case studies that show you how these technologies and architectures work. The case studies include both AToM and L2TPv3 and reveal real-world service provider and enterprise design problems and solutions with hands-on configuration examples and implementation details. The case studies include all Layer 2 technologies transported using AToM and L2TPv3 pseudowires, including Ethernet, Ethernet VLAN, HDLC, PPP, Frame Relay, ATM AAL5 and ATM cells, and advanced topics relevant to Layer 2 VPN deployment, such as QoS and scalability"--Resource description page. 
588 0 |a Print version record. 
542 |f Copyright© 2005 Cisco Systems, Inc.  |g 2005 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Extranets (Computer networks) 
650 6 |a Extranets. 
650 7 |a Extranets (Computer networks)  |2 blmlsh 
650 7 |a Extranets (Computer networks)  |2 fast 
700 1 |a Luo, Wei. 
776 0 8 |i Print version:  |t Layer 2 VPN architectures.  |d Indianapolis, Ind. : Cisco Press, 2005  |z 9781587058486  |w (DLC) 2003109688  |w (OCoLC)457503758 
830 0 |a Cisco Press networking technology series. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780132492485/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37819857 
938 |a Askews and Holts Library Services  |b ASKH  |n AH38082089 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 263874 
938 |a YBP Library Services  |b YANK  |n 14851102 
994 |a 92  |b IZTAP