Home > Computing and Information Technology > Computer networking and communications > Building MPLS-Based Broadband Access VPNs
15%
Building MPLS-Based Broadband Access VPNs

Building MPLS-Based Broadband Access VPNs

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Implement the design principles and configurations behind MPLS-based VPNs for broadband access networks The book discusses how MPLS and its VPN service are best used in a broadband environment, concentrating on key design issues and solutions, including How to manage tens of thousands of interfaces and host routes and hundreds of dynamic VPNs When a Virtual Home Gateway is necessary Why use dynamic address assignment How routes should be summarized into the core Deploy MPLS VPNs successfully in broadband networks with Building MPLS-Based Broadband Access VPNs. This book helps you understand why and how today's broadband networks function, covering the principal access technologies: DSL, Ethernet, and cable. The book also examines the different tunneling protocols used for VPN solutions today, namely GRE, IPSec, and L2TP, with examples of how these solutions are deployed and a discussion of their strengths and weaknesses. Building MPLS-Based Broadband Access VPNs also includes an in-depth description of the IOS VRF Lite, which helps you use VRF-aware features with an IP core. Detailed descriptions of the technologies, design principles, network configurations, and case studies are provided throughout the book, helping you develop a pragmatic understanding of MPLS-based broadband access VPNs. Obtain a realistic understanding of large-scale broadband access network design requirements Recognize the business impact of using MPLS to provide access VPN services, including the advantages of QoS, availability, and provisioning Use MPLS in access VPN and transport networks and deal with the unique scalability problems that such networks pose Leverage VRF-aware features to deploy IP-based VPNs Includes detailed Cisco IOS configuration examples based on real-world scenarios This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Table of Contents:
Foreword Introduction Chapter 1            Introduction: Broadband Access and Virtual Private Networks Broadband Networks and Operators The Players in Broadband DSL Networks Metropolitan-Area Networks  The Role of the Access Network Shifting the Location of the Processing  Service Models: Who Buys What Business Subscribers Residential Subscribers IP Virtual Private Networks for Broadband A VPN Taxonomy Layer 2 and Layer 3 VPN Alternatives Overlay VPNs The Peer Model A Simplified Framework for Broadband VPN Data Confidentiality Efficient Operation Efficient Routing  High Availability and Resiliency Device-Level Redundancy Network-Level Redundancy Multicast Quality of Service Fragmentation Authentication, Authorization, and Accounting (AAA) Service Selection Support for Any IP Addressing Plan Efficient Address Assignment Additional Layer 3 Services Summary Chapter 2            Delivering Broadband Access Today: An Access Technologies Primer Architecture 1: Bridged Access Networks Bridging in DSL Using RFC 2684 RBE Configuration RBE Quality of Service RBE Routing RBE Address Assignment  More Bridged Access—Cable and DOCSIS DOCSIS Cisco IOS Configuration Cable Address Assignment  Broadband Ethernet—Ethernet to the Home/Business (ETTX) Long Reach Ethernet ETTX Configuration ETTX Quality of Service ETTX Address Assignment Security Considerations for Bridged Broadband Architectures Security in DSL Broadband Networks Security in Cable Broadband Networks Security in Ethernet Broadband Networks Authentication and Accounting in Bridged Broadband Architectures Architecture 2: Point-to-Point Protocol Networks PPP over Ethernet—The CPE as a Bridge PPPoE Configuration PPPoE Service Selection and Discovery PPP over ATM: The CPE as a Router PPPoA Configuration PPP Address Assignments Use of On-Demand Address Pools PPP Quality of Service PPP Authentication, Accounting, and Security Port-Based Authentication PPP Security  Summary Chapter 3            VPNs in Broadband Networks Tunnels, Hubs, and Spokes To Distribute or Centralize? Access VPN Requirements Reminder Case 1: A Site VPN with Non-IP Traffic—GRE GRE Protocol and Operation GRE Configuration GRE Design Considerations Case 2: VPN over Anything—IPSec IPSec Protocol and Operation AH and ESP Headers for Authentication and Encryption Key Exchange with IKE IPSec Tunnel and Transport Mode Encapsulations IPSec Configuration  IPSec Configuration Examples Simple Site-to-Site IPSec Encrypted GRE Dynamic Multicast VPN IPSec for Remote Access  IPSec Design Considerations  Case 3: L2TP—For Open Access L2TP Protocol and Operation L2TP Tunnel Setup L2TP Session Setup L2TP Configuration Scaling L2TP Networks Data Plane: L2TP LNS Redundancy and Load Balancing Control Plane: AAA Redundancy and Load Balancing L2TP Tunnel Switching  L2TP Design Considerations Other Open Access Solutions Open Access with Network Address Translation Open Access with Policy-Based Routing Summary Chapter 4            Introduction to MPLS  Definition of MPLS IP and MPLS Packet Forwarding MPLS Encapsulation Label Distribution LDP Operation Traffic Engineering MPLS-TE Cisco IOS Configuration Layer 3 VPN Services (RFC 2547) MPLS-VPN Attributes MPLS-VPN Cisco IOS Configuration MPLS QoS QoS in MPLS Packet Headers Complication 1: DSCP Complication 2: ATM  Tunnels and Pipes DiffServ-Aware Traffic Engineering Summary Chapter 5            Introduction to MPLS-Based Access VPN Architectures  Architecture Overview of an MPLS-Based Access VPN The Role of the PE Mapping Cable Subscribers to VRFs Mapping Ethernet Subscribers to VRFs Mapping DSL Subscribers to VRFs Routed Interfaces Routed Bridge Encapsulation PPP  Virtual Home Gateway  VHG for Cable or Ethernet Examples of the Basic Architectures Direct PPP Termination Configuration Monitoring Direct PPP Termination Two-Box Virtual Home Gateway Example Monitoring the Two-Box VHG Solution Multi-VRF CE Configuration  Comparison Using the Broadband VPN Framework Data Confidentiality Efficient Operation Efficient Routing High Availability and Resiliency Multicast Quality of Service Fragmentation Authentication, Authorization, and Accounting Service Selection Support Any IP Addressing Plan Efficient Address Management Additional L3 Services Summary Chapter 6            Wholesale MPLS-VPN Related Service Features Bindings Again—Dynamic VRF Allocation AAA Again—VRF Name and the AAA Attribute Direct PPP Termination and Aggregation with AAA  VHG with AAA DHCP—Life Without AAA PBR—A Two-Box Solution Service Selection Gateway—Another Two-Box Solution VRF Select Proxy RADIUS and Per-VRF AAA Per-VRF AAA Configuration Per-VRF AAA Templates Per-VRF AAA Accounting Assigning and Managing Overlapping Addresses  Overlapping Device-Local Pools  On-Demand Address Pools The Host Route Solution ODAP and Address Assignments Summary Chapter 7            Implementing Network-Based Access VPNs Without MPLS Introduction to Virtual Routers Implementing Virtual Routing with Cisco IOS Using Tunnels to Build Network-Based IP VPN Using GRE for IP VPN Using IPSec for IP VPN Routing Between VRF-Lite PEs Campus Hop-to-Hop Topology RIP Between VRF-LITE RIP to BGP Summary Chapter 8            Case Studies for Using MPLS with Broadband VPNs Case Study 1: Managed LNS Service Definitions L2TP-Based Wholesale Service: Managed LNS Clients Circuit Aggregation: LAC IP Aggregation: LNS Control Plane: AAA Network and Service Availability MPLS-Based Wholesale Service Clients PTA PE ISP PE Address Allocation and Routing Control Plane: AAA QoS and Multicast Case Study 2: D/V/V Over Ethernet Service Definitions Network Design Clients Access Layer: Circuit Aggregation Distribution Layer: IP Aggregation Adding Open Access An Alternative Open Access Design Summary Chapter 9            Future Developments in Broadband Access Introduction to IPv6 Address Space Size Addressing Extensions Autoconfiguration Deployment Scenarios of IPv6 Enterprise Deploys IPv6 Internally but Uses an IPv4 VPN Service A Retail ISP Moves to IPv6 Only the Wholesaler Moves to IPv6 L2 Transport and L2VPN Pseudo-wires AToM L2 Transport over L2TPv3  Applications and Implications for Broadband Access Summary Appendix A            References and Bibliography Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapters 5, 6, 7, and 8 Chapter 9 Indx 


Best Sellers


Product Details
  • ISBN-13: 9781587051364
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Height: 232 mm
  • No of Pages: 408
  • Spine Width: 28 mm
  • Width: 240 mm
  • ISBN-10: 1587051362
  • Publisher Date: 25 Nov 2004
  • Binding: Hardback
  • Language: English
  • Returnable: Y
  • Weight: 898 gr


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Building MPLS-Based Broadband Access VPNs
Pearson Education (US) -
Building MPLS-Based Broadband Access VPNs
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Building MPLS-Based Broadband Access VPNs

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA