Layer 2 VPN Architectures


请输入要查询的图书:

可以输入图书全称,关键词或ISBN号

Layer 2 VPN Architectures

ISBN: 9781587051685

作者: Carlos Pignataro/Anthony Chan

出版社: Macmillan Technical Pub

出版年: 2005-3-10

页数: 648

定价: 892.40元

装帧: HRD

内容简介


A complete guide to understanding, designing, and deploying Layer 2 VPN technologies and pseudowire emulation applications

Evaluate market drivers for Layer 2 VPNs

Understand the architectural frame-work and choices for Layer 2 VPNs, including AToM and L2TPv3

Grasp the essentials of Layer 2 LAN and WAN technologies

Examine the theoretical and operational details of MPLS and LDP as they pertain to AToM

Understand the theoretical and operational details of Layer 2 protocols over L2TPv3 in IP networks

Learn about Layer 2 VPN bridged and routed interworking and Layer 2 local switching

Understand the operation and application of Virtual Private LAN Services (VPLS)

Learn about foundation and advanced AToM and L2TPv3 topics through an extensive collection of case studies

The historical disconnect between legacy Layer 2 and Layer 3 VPN solutions has forced service providers to build, operate, and maintain separate infrastructures to accommodate various VPN access technologies. This costly proposition, however, is no longer necessary. As part of its new Unified VPN Suite, Cisco Systems? now offers next-generation Layer 2 VPN services like Layer 2 Tunneling Protocol version 3 (L2TPv3) and Any Transport over MPLS (AToM) that enable service providers to offer Frame Relay, ATM, Ethernet, and leased-line services over a common IP/MPLS core network. By unifying multiple network layers and providing an integrated set of software services and management tools over this infrastructure, the Cisco? Layer 2 VPN solution enables established carriers, IP-oriented ISP/CLECs, and large enterprise customers (LECs) to reach a broader set of potential VPN customers and offer truly global VPNs.

Layer 2 VPN Architectures is a comprehensive guide to consolidating network infrastructures and extending VPN services. The book opens by discussing Layer 2 VPN applications utilizing both AToM and L2TPv3 protocols and comparing Layer 3 versus Layer 2 provider-provisioned VPNs. In addition to describing the concepts related to Layer 2 VPNs, this book provides an extensive collection of case studies that show you how these technologies and architectures work. The case studies include both AToM and L2TPv3 and reveal real-world service provider and enterprise design problems and solutions with hands-on configuration examples and implementation details. The case studies include all Layer 2 technologies transported using AToM and L2TPv3 pseudowires, including Ethernet, Ethernet VLAN, HDLC, PPP, Frame Relay, ATM AAL5 and ATM cells, and advanced topics relevant to Layer 2 VPN deployment, such as QoS and scalability.

作者简介


Wei Luo, CCIE No. 13,291, is a technical leader at Cisco Systems, Inc. Since joining Cisco in 1998, Wei has led many product design and development initiatives in remote-access networks, WANs, and MPLS technologies. He is the principle designer and developer for Cisco Pseudowire Emulation and Layer 2 VPN products, such as AToM and VPLS. He actively participates in IETF standardization processes, contributing to and authoring various RFCs and Internet drafts in the IETF working groups. Wei has B.S. and M.S. degrees in computer science.

Carlos Pignataro, CCIE No. 4619, is a senior engineer in the Escalation Team for Cisco Systems, Inc. In this role he is responsible for handling difficult and complex escalations, working on critical or stalled software defects, and participating in the new product and development process. Carlos has a B.S. in electrical engineering and an M.S. in telecommunications and networking. Carlos has contributed to IETF Internet drafts, is an active speaker at Net-workers conventions, and has authored Cisco Multiservice Switching Networks also by Cisco Press.

Dmitry Bokotey, CCIE No. 4460, holds a quadruple CCIE title in the fields of Routing and Switching, ISP Dial, Security, and Service Provider. He is a network consulting engineer with the Central Engineering and Metro Ethernet team of Cisco Systems. For the past twelve years, he has designed and implemented diverse networking environments for various large enterprise and service provider customers. Over the course of his career, he has presented seminars on numerous advanced networking subjects. He is coauthor on two other books published by Cisco Press: CCIE Practical Studies: Security and CCNP Practical Studies: Remote Access.

Anthony Chan, Service Provider CCIE No. 10,266, is a network consulting engineer for Cisco Systems' Advanced Services Central Engineering organization. Anthony participates in MPLS and routing technology teams, which provide focused design and proactive support to service provider and enterprise customers. He holds a bachelor's degree in electrical engineering from Northwestern University and has previously worked at Ford Motor Company and International Network Services.

目录


Part I: Foundation The book begins by explaining the existing market drivers for Layer 2 VPNs and explores where each of the various types of VPNs exist. It introduces the architectural framework and choices for Layer 2 VPNs and delves into pseudowire emulation realizations and details. This part also describes the architectural reference model and standardarization process of Layer 2 VPNs and pseudowire technologies, and introduces you to AToM and L2TPv3.
Chapter 1, "Understanding Layer 2 VPNs": This chapter introduces L2VPNs and its motivations. It also compares Layer 2 versus Layer 3 VPNs.
Chapter 2, "Pseudowire Emulation Framework and Standards" This chapter presents the pseudowire emulation reference model and architectural components, defines key terminology, and explains the history and standardization of pseudowire emulation in the IETF.
Chapter 3, "Layer 2 VPN Architectures" This chapter introduces AToM and L2TPv3 and presents business and technical factors to be considered when choosing a Layer 2 VPN technology.
Part II: Layer 2 Protocol Primer This part provides a complete overview of Layer 2 LAN and WAN technologies.
Chapter 4, "LAN Protocols" This chapter includes and overview of LAN protocols, such as Ethernet II and 802.3, Ethernet dot1Q, Ethernet QinQ, spanning tree, and related technologies.
Chapter 5, "WAN Data-Link Protocols" This chapter outlines different WAN protocols including HDLC, PPP, Frame Relay, and ATM.
Part III: Any Transport over MPLS The chapters in this part cover the theoretical and operational details of MPLS and LDP as they pertain to AToM, analyze the control plane (pseudowire signaling) and data plane (data encapsulation), describe the design and implementation of AToM technologies, and provide LAN and WAN protocols over MPLS and advanced AToM case studies.
Chapter 6, "Understanding Any Transport over MPLS" This chapter details AToM and LDP operations for pseudowire signaling and describes AToM pseudowire encapsulation.
Chapter 7, "LAN Protocols over MPLS Case Studies" This chapter presents the underlying theory and case studies for LAN protocols over MPLS including port-to-port and dot1Q modes.
Chapter 8, "WAN Protocols over MPLS Case Studies" This chapter presents the underlying theory and case studies for all WAN protocols over MPLS and their various modes of operation.
Chapter 9, "Advanced AToM Case Studies" This chapter concludes the AToM section with advanced case studies such as load sharing, preferred path selection, AToM with traffic engineering (TE), AToM over GRE, inter-AS AToM, VCCV and QoS.
Part IV: Layer 2 Tunneling Protocol Version 3 This part discusses the theory on Layer 2 protocols over Layer 2 Tunneling Protocol version 3 (L2TPv3) in IP networks, analyzes the control plane L2TPv3 protocol interactions and data plane encapsulation details, and provides LAN and WAN protocols and advanced case studies.
Chapter 10, "Understanding L2TPv3" This chapter starts with Universal Transport Interface (UTI) history and evolvement into L2TPv3; it then details L2TPv3 control plane including tunnels, sessions, cookies, AVPs, control plane messages and message formats, as well as the L2TPv3 data plane including the data packet formats.
Chapter 11, "LAN Protocols over L2TPv3 Case Studies" This chapter presents the underlying theory and case studies for LAN protocols over L2TPv3 including static sessions, static sessions with keepalives, and dynamic sessions for Ethernet port-to-port and VLAN modes with and without VLAN rewrite.
Chapter 12, "WAN Protocols over L2TPv3 Case Studies" This chapter presents the fundamental theory and case studies for all WAN protocols over L2TPv3 including HDLC, PPP, Frame Relay (DLCI and port modes), and ATM (AAL5 and the various Cell Relay modes).
Chapter 13, "Advanced L2TPv3 Case Studies" This chapter details advanced case studies for L2TPv3 networks including Path MTU Discovery, ATM OAM Emulation and cell packing, and QoS.
Part V: Additional Layer 2 VPN Architectures This part presents Any-to-Any Layer 2 VPN interworking, local switching, and Virtual Private LAN Service (VPLS). The part includes both architectural and theoretical frameworks, and configuration and design case studies.
Chapter 14, "Layer 2 Interworking and Local Switching" This chapter introduces the related Layer 2 VPN architectures of Layer 2 IP and Ethernet interworking (that is, routed and bridged interworking, respectively), Layer 2 local switching, and the combinations of interworking with local switching. This chapter includes details and case studies for both AToM and L2TPv3.
Chapter 15, "Virtual Private LAN Service" This chapter introduces the VPLS application with theory, configuration, and multiple case studies.
关键词:Layer 2 VPN Architectures